Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 331 - 340 de 5303
Informatique de santé — Ressources des connaissances cliniques — Métadonnées
Le présent document spécifie un certain nombre d'éléments de métadonnées qui décrivent des ressources contenant des connaissances médicales, principalement des documents numériques fournis sous forme de ressources Web accessibles à partir de bases de données ou par transfert de fichier, mais qui peuvent également s'appliquer à des documents papier, par exemple, des articles de…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-10-05
Code(s) de l'ICS :
35.240.80
Information technology — Conformance test methods for security service crypto suites — Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11. This document contains conformance tests for all mandatory functions. The conformance parameters are the following: —    parameters that apply directly affecting system functionality and inter-operability; —    protocol including commands and replies; —    nominal values and…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.030
Information technology - Conformance test methods for security service crypto suites - Part 11: Cryp...
This document specifies methods for determining conformance to the security crypto suite defined in ISO/IEC 29167-11. This document contains conformance tests for all mandatory functions. The conformance parameters are the following: — parameters that apply directly affecting system functionality and inter-operability; — protocol including commands and replies; — nominal values and…
Éditeur :
IEC
Statut :
Publié
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.030
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
1 Scope This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.030
Systems and software engineering — High-level Petri nets — Part 3: Extensions and structuring mechan...
1 Scope This document defines enrichments, extensions and structuring mechanisms of Petri nets, applied on the definitions proposed in ISO/IEC 15909-1. This document facilitates the definitions of new kinds of Petri nets and their interoperability, while remaining compatible with those defined in ISO/IEC 15909-1. This document is written as a reference for designers of new Petri net variants,…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.080
Information technology — Data protocol for radio frequency identification (RFID) for item management...
1 Scope This document focuses on the abstract interface between an application and the data processor and includes the specification and definition of application commands and responses. It allows data and commands to be specified in a standardised way, independent of the ISO/IEC 18000 series air interfaces. This document: — provides guidelines on presenting data as objects; — defines the…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.040.50
Information technology — Radio frequency identification (RFID) for item management — Data protocol: ...
1 Scope This document focuses on encoding the transfer syntax of the application commands defined in ISO/IEC 15961-1. The encodation is in a Logical Memory as a software analogue of the physical memory of the RFID tag being addressed by the interrogator. This document — defines the encoded structure of object identifiers; — specifies the data compaction rules that apply to the encoded data…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.040.50
Information technology — Radio frequency identification for item management — Part 63: Parameters fo...
1 Scope This document defines the air interface for radio frequency identification (RFID) devices operating in the 860 MHz to 960 MHz industrial, scientific, and medical (ISM) band used in item management applications. It provides a common technical specification for RFID devices that can be used to develop RFID application standards. This document is intended to allow for compatibility and to…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.040.50
Telecommunications and exchange between information technology systems — Requirements for local and ...
1.1 Scope For the purpose of providing compatible authentication, authorization, and cryptographic key agreement mechanisms to support secure communication between devices connected by IEEE 802® Local Area Networks (LANs), this standard a) Specifies a general method for provision of port-based network access control. b) Specifies protocols that establish secure associations for IEEE Std 802.…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2022-09-30
Code(s) de l'ICS :
35.110
Molecular biomarker analysis — Requirements for microarray detection of specific nucleic acid sequen...
This document specifies verification and validation parameters and processes for microarray detection and identification of specific nucleic acid sequences. This document provides recommendations and protocols for: —    microarray design and manufacture; —    validation of hybridization specificity; —    interlaboratory validation of qualitative methods; —    determination of limits of detection…
Éditeur :
ISO
Statut :
Publié
Date de publication :
2022-09-27
Code(s) de l'ICS :
67.050

Spacer