Information technology — Open distributed processing — Reference model — Enterprise language
This Recommendation | International Standard provides:
a) a language (the enterprise language) comprising concepts, structures, and rules for developing,
representing and reasoning about a specification of an ODP system from the enterprise viewpoint
(as defined in Rec. ITU-T X.903 | ISO/IEC 10746-3);
b) rules which establish correspondences between the enterprise language and the other viewpoint…
Information technology — Automatic identification and data capture techniques — Bar code verifier co...
This part of ISO/IEC 15426 defines test methods and minimum accuracy criteria applicable to verifiers
using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix
symbologies, and specifies reference calibration standards against which these should be tested. This
part of ISO/IEC 15426 provides for testing of representative samples of the equipment.
NOTE ISO/…
Information technology — Automatic identification and data capture techniques — QR Code bar code sym...
This International Standard defines the requirements for the symbology known as QR Code. It specifies
the QR Code symbology characteristics, data character encoding methods, symbol formats, dimensional
characteristics, error correction rules, reference decoding algorithm, production quality requirements,
and user-selectable application parameters.
Information technology — Automatic identification and data capture techniques — PDF417 bar code symb...
This International Standard specifies the requirements for the bar code symbology known as PDF417.
It specifies PDF417 symbology characteristics, data character encodation, symbol formats, dimensions,
error correction rules, reference decoding algorithm, and a number of application parameters.
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic
techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities
A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as
the…
Information technology — Security techniques — Information security management for inter-sector and ...
This International Standard provides guidelines in addition to the guidance given in the
ISO/IEC 27000 family of standards for implementing information security management within
information sharing communities.
This International Standard provides controls and guidance specifically relating to initiating,
implementing, maintaining, and improving information security in inter-organizational and…
Information technology — Security techniques — Network security — Part 1: Overview and concepts
This part of ISO/IEC 27033 provides an overview of network security and related definitions. It defines
and describes the concepts associated with, and provides management guidance on, network security.
(Network security applies to the security of devices, security of management activities related to the
devices, applications/services, and end-users, in addition to security of the information…
Information technology — Trusted Platform Module Library — Part 1: Architecture
This part of ISO/IEC 11889 defines the architectural elements of the Trusted Platform Module (TPM), a
device which enables trust in computing platforms in general. Some TPM concepts are explained
adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a
TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in…
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE)...
quality in terms of characteristics defined in ISO/IEC 25012.
This International Standard contains the following:
— a basic set of data quality measures for each characteristic;
— a basic set of target entities to which the quality measures are applied during the data-life-cycle;
— an explanation of how to apply data quality measures;
— a guidance for organizations defining their own measures for…
Information technology — Security techniques — Code of practice for information security controls ba...
This Recommendation | International Standard gives guidelines for information security controls applicable to the
provision and use of cloud services by providing:
– additional implementation guidance for relevant controls specified in ISO/IEC 27002;
– additional controls with implementation guidance that specifically relate to cloud services.
This Recommendation | International Standard provides…