Intelligent transport systems — Cooperative ITS — Part 1: Roles and responsibilities in the context ...
This document contains a detailed description of the (actor invariant) roles (3.22) and responsibilities (3.21) required to deploy and operate Cooperative-ITS (C-ITS) (3.8). The organization/organization of actors / roles described in this document are designed to be appropriate for any fully operational system that uses the C-ITS concepts and techniques in order to achieve its service provision…
Information technology — Guidance for biometric enrolment
This document consolidates information relating to successful, secure and usable implementation of biometric enrolment processes, while indicating risk factors that organisations proposing to use biometric technologies will should address during procurement, design, deployment and operation. Much of the information is generic to many types of application, e.g. from national scale commercial and…
Information technology - Guidance for biometric enrolment
This document consolidates information relating to successful, secure and usable implementation of biometric enrolment processes, while indicating risk factors that organisations proposing to use biometric technologies will should address during procurement, design, deployment and operation. Much of the information is generic to many types of application, e.g. from national scale commercial and…
Information technology - Performance testing of biometric template protection schemes
ISO/IEC 30136:2018 supports evaluation of the accuracy, secrecy, and privacy of biometric template protection schemes. It establishes definitions, terminology, and metrics for stating the performance of such schemes. Particularly, this document establishes requirements for the measurement and reporting of:
- theoretical and empirical accuracy of biometric template protection schemes,
-…
Information technology — Performance testing of biometric template protection schemes
ISO/IEC 30136:2018 supports evaluation of the accuracy, secrecy, and privacy of biometric template protection schemes. It establishes definitions, terminology, and metrics for stating the performance of such schemes. Particularly, this document establishes requirements for the measurement and reporting of:
- theoretical and empirical accuracy of biometric template protection schemes,
-…
ISO/IEC 19286:2018 aims to normalize privacy-enhancing protocols and services by
- using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy,
- providing discoverability means of privacy-enabling attributes,
- defining requirements for attribute-based credential handling, and
- identifying data objects and commands for ICCs…
ISO/IEC 19286:2018 aims to normalize privacy-enhancing protocols and services by
- using the mechanisms from parts of ISO/IEC 7816 and parts of ISO/IEC 18328 that contribute to security and privacy,
- providing discoverability means of privacy-enabling attributes,
- defining requirements for attribute-based credential handling, and
- identifying data objects and commands for ICCs…
Information technology — Home network resource management — Part 1: Requirements
This part of ISO/IEC 30100 specifies the minimum requirements of a home network resource
management architecture to deliver applications in a safe and future-proof way without being
prescriptive. The purpose of this standard is to collect all available home network information
from different types of home network elements and protocols, and to provide the interrelationships
among the elements of…