Informatique de santé — Ressources des connaissances cliniques — Métadonnées
Le présent document spécifie un certain nombre d'éléments de métadonnées qui décrivent des ressources contenant des connaissances médicales, principalement des documents numériques fournis sous forme de ressources Web accessibles à partir de bases de données ou par transfert de fichier, mais qui peuvent également s'appliquer à des documents papier, par exemple, des articles de…
Information technology — Conformance test methods for security service crypto suites — Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information technology - Conformance test methods for security service crypto suites - Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11.
This document contains conformance tests for all mandatory functions.
The conformance parameters are the following:
— parameters that apply directly affecting system functionality and inter-operability;
— protocol including commands and replies;
— nominal values and…
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
1 Scope
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result…
Systems and software engineering — High-level Petri nets — Part 3: Extensions and structuring mechan...
1 Scope
This document defines enrichments, extensions and structuring mechanisms of Petri nets, applied on the definitions proposed in ISO/IEC 15909-1. This document facilitates the definitions of new kinds of Petri nets and their interoperability, while remaining compatible with those defined in ISO/IEC 15909-1.
This document is written as a reference for designers of new Petri net variants,…
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope
This document focuses on the abstract interface between an application and the data processor and includes the specification and definition of application commands and responses. It allows data and commands to be specified in a standardised way, independent of the ISO/IEC 18000 series air interfaces.
This document:
— provides guidelines on presenting data as objects;
— defines the…
Information technology — Radio frequency identification (RFID) for item management — Data protocol: ...
1 Scope
This document focuses on encoding the transfer syntax of the application commands defined in ISO/IEC 15961-1. The encodation is in a Logical Memory as a software analogue of the physical memory of the RFID tag being addressed by the interrogator.
This document
— defines the encoded structure of object identifiers;
— specifies the data compaction rules that apply to the encoded data…
Information technology — Radio frequency identification for item management — Part 63: Parameters fo...
1 Scope
This document defines the air interface for radio frequency identification (RFID) devices operating in the 860 MHz to 960 MHz industrial, scientific, and medical (ISM) band used in item management applications. It provides a common technical specification for RFID devices that can be used to develop RFID application standards. This document is intended to allow for compatibility and to…
Telecommunications and exchange between information technology systems — Requirements for local and ...
1.1 Scope
For the purpose of providing compatible authentication, authorization, and cryptographic key agreement
mechanisms to support secure communication between devices connected by IEEE 802® Local Area
Networks (LANs), this standard
a) Specifies a general method for provision of port-based network access control.
b) Specifies protocols that establish secure associations for IEEE Std 802.…
Molecular biomarker analysis — Requirements for microarray detection of specific nucleic acid sequen...
This document specifies verification and validation parameters and processes for microarray detection and identification of specific nucleic acid sequences.
This document provides recommendations and protocols for:
— microarray design and manufacture;
— validation of hybridization specificity;
— interlaboratory validation of qualitative methods;
— determination of limits of detection…