Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 11 - 20 de 409
Information technology - OpenID connect - OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines the core OpenID Connect functionality: authentication built on…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2024-09-30
Code(s) de l'ICS :
35.030
Information technology — OpenID connect — OpenID connect core 1.0 incorporating errata set 2
OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner. This document defines the core OpenID Connect functionality: authentication built on…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-09-30
Code(s) de l'ICS :
35.030
Information security, cybersecurity and privacy protection — Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk. This document is applicable to the risk assessment of processes and…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-06-30
Code(s) de l'ICS :
03.100.01; 35.030
Information security, cybersecurity and privacy protection - Application of ISO 31000 for assessment...
This document provides guidelines for identity-related risk, as an extension of ISO 31000:2018. More specifically, it uses the process outlined in ISO 31000 to guide users in establishing context and assessing risk, including providing risk scenarios for processes and implementations that are exposed to identity-related risk. This document is applicable to the risk assessment of processes and…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2024-06-30
Code(s) de l'ICS :
03.100.01; 35.030
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-06-24
Code(s) de l'ICS :
35.030
Cybersecurity – IoT security and privacy – Guidelines for IoT-domotics
This document provides guidelines to analyse security and privacy risks and identifies controls that can be implemented in Internet of Things (IoT)-domotics systems.
Éditeur :
IEC
Statut :
Publié
Date de publication :
2024-06-24
Code(s) de l'ICS :
35.030
Health informatics — Workforce roles and capabilities for terminology and terminology services in he...
This document specifies the tasks, roles, and key skills, requirements and competencies for personnel involved in terminology services in healthcare organizations. This document specifies: —     terminology services in healthcare organizations including the selection, authoring, and deployment and use of terminology subsets, data sets and maps; developing and managing terminology management…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-05-14
Code(s) de l'ICS :
35.240.80
Information technology — Business operational view — Part 17: Fundamental principles and rules gover...
This document: a)       focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information; b)       establishes a fundamental set of privacy principles known as Privacy…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-04-08
Code(s) de l'ICS :
35.240.63
Information technology - Business operational view - Part 17: Fundamental principles and rules gover...
This document: a) focuses on PbD aspects of privacy protection requirements as external constraints on any type of Person, (e.g. organization or public administration) involved in any kind of business transaction among such Persons which involves the electronic data interchange (EDI) of any personal information; b) establishes a fundamental set of privacy principles known as Privacy…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2024-04-08
Code(s) de l'ICS :
35.240.63
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hard...
This document surveys and summarizes the existing hardware monitoring methods, including research efforts and industrial applications. The explored monitoring technologies are classified by applied area, carrier type, target entity, objective pattern, and method of deployment. Moreover, this document summarizes the possible ways of utilizing monitoring technologies for hardware security…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2024-04-02
Code(s) de l'ICS :
35.030