Rechercher

Affiner les résultats
Code de la Classification internationale pour les normes (ICS)
Source
Code de l’organisme d’élaboration de normes (OEN)
Langue
Statut
Code de la Norme nationale du Canada (NNC)
Date de publication

De

à

Affichage 911 - 920 de 2984
Information technology — Open distributed processing — Reference model — Enterprise language
This Recommendation | International Standard provides: a) a language (the enterprise language) comprising concepts, structures, and rules for developing, representing and reasoning about a specification of an ODP system from the enterprise viewpoint (as defined in Rec. ITU-T X.903 | ISO/IEC 10746-3); b) rules which establish correspondences between the enterprise language and the other viewpoint…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.080
Information technology — Automatic identification and data capture techniques — Bar code verifier co...
This part of ISO/IEC 15426 defines test methods and minimum accuracy criteria applicable to verifiers using the methodologies of ISO/IEC 15415 for multi-row bar code symbols and two-dimensional matrix symbologies, and specifies reference calibration standards against which these should be tested. This part of ISO/IEC 15426 provides for testing of representative samples of the equipment. NOTE ISO/…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040
Information technology — Automatic identification and data capture techniques — QR Code bar code sym...
This International Standard defines the requirements for the symbology known as QR Code. It specifies the QR Code symbology characteristics, data character encoding methods, symbol formats, dimensional characteristics, error correction rules, reference decoding algorithm, production quality requirements, and user-selectable application parameters.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
01.080.50; 35.040
Information technology — Automatic identification and data capture techniques — PDF417 bar code symb...
This International Standard specifies the requirements for the bar code symbology known as PDF417. It specifies PDF417 symbology characteristics, data character encodation, symbol formats, dimensions, error correction rules, reference decoding algorithm, and a number of application parameters.
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric ...
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the…
Éditeur :
CSA
Statut :
Annulée
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040
Information technology — Security techniques — Information security management for inter-sector and ...
This International Standard provides guidelines in addition to the guidance given in the ISO/IEC 27000 family of standards for implementing information security management within information sharing communities. This International Standard provides controls and guidance specifically relating to initiating, implementing, maintaining, and improving information security in inter-organizational and…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040
Information technology — Security techniques — Network security — Part 1: Overview and concepts
This part of ISO/IEC 27033 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services, and end-users, in addition to security of the information…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040
Information technology — Trusted Platform Module Library — Part 1: Architecture
This part of ISO/IEC 11889 defines the architectural elements of the Trusted Platform Module (TPM), a device which enables trust in computing platforms in general. Some TPM concepts are explained adequately in the context of the TPM itself. Other TPM concepts are explained in the context of how a TPM helps establish trust in a computing platform. When describing how a TPM helps establish trust in…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040
Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE)...
quality in terms of characteristics defined in ISO/IEC 25012. This International Standard contains the following: — a basic set of data quality measures for each characteristic; — a basic set of target entities to which the quality measures are applied during the data-life-cycle; — an explanation of how to apply data quality measures; — a guidance for organizations defining their own measures for…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.080
Information technology — Security techniques — Code of practice for information security controls ba...
This Recommendation | International Standard gives guidelines for information security controls applicable to the provision and use of cloud services by providing: – additional implementation guidance for relevant controls specified in ISO/IEC 27002; – additional controls with implementation guidance that specifically relate to cloud services. This Recommendation | International Standard provides…
Éditeur :
CSA
Statut :
Norme
Date de publication :
2016-11-30
Code(s) de l'ICS :
35.040