Technologies de l'information — Classement international et comparaison de chaînes de caractère...
Le présent document définit ce qui suit.
— Une méthode de référence pour la comparaison de deux chaînes de caractères ayant pour but de déterminer leur ordre de classement dans une liste triée. La méthode s'applique à des chaînes utilisant le répertoire complet de l'ISO/IEC 10646, des sous-répertoires tels que ceux des divers jeux normalisés ISO/IEC à 8 bits ou tout autre jeu de…
Information security, cybersecurity and privacy protection — Guidelines on privacy preservation base...
This document provides guidelines on using zero knowledge proofs (ZKP) to improve privacy
by reducing the risks associated with the sharing or transmission of personal data between
organisations and users by minimizing the information shared. It will include several ZKP
functional requirements relevant to a range of different business use cases, then describes
how different ZKP models can be used…
Information security, cybersecurity and privacy protection – Controls and guidance for personally id...
This Recommendation | International Standard establishes controls, purpose, and guidance for implementing controls, to meet the requirements identified by a risk and impact assessment related to the protection of personally identifiable information (PII).
In particular, this Recommendation | International Standard specifies guidance based on ISO/IEC 27002, taking into consideration the controls…
Industrial automation systems and integration — Product data representation and exchange — Part 62: ...
The scope is equivalence validation of product data. Product data may travel between two or more IT systems during design and manufacturing processes. Data translation is applied as necessary during that travel. Or product data may be reused after long-term data retention.
In these scenarios, validation of whether or not translated product data can be regarded as equivalent to the product data…
Information technology — Radio frequency identification for item management — Part 65: Parameters fo...
This document defines the air interface based on ISO/IEC 18000-63 for radio frequency identification (RFID) devices operating in the 860 MHz to 930 MHz used in sensing as well as item management applications.
This document specifies the physical and logical requirements for a passive-backscatter Interrogator-Talks-First (ITF) systems. The system comprises Interrogators, also known as readers,…
Wheelchair seating — Part 6: Determination of changes in properties of seat cushions following simul...
ISO 16840-6:2015 specifies apparatus, test methods, and disclosure requirements for generating aging effects in a seat cushion that reproduce those seen in use. It also provides methods of determining changes in the physical and mechanical properties of seat cushions based on their age and use. ISO 16840-6:2015 provides a set of tests that simulate wear and tear, which can be useful to validate…
Sécurité de l'information, cybersécurité et protection de la vie privée — Mesures de sécurité e...
La présente Recommandation | Norme internationale établit des objectifs de mesure de sécurité, des mesures de sécurité et des lignes directrices pour la mise en œuvre des mesures de sécurité, afin de satisfaire aux exigences identifiées par une appréciation du risque et de l'impact liée à la protection des données à caractère personnel.
En particulier, la présente Recommandation | Norme…
Information technology — Cloud computing — Common technologies and techniques
This document provides a description of a set of common technologies and techniques used in conjunction with cloud computing. These include:
— virtual machines (VMs) and hypervisors;
— containers and container management systems (CMSs);
— serverless computing;
— microservices architecture;
— automation;
— platform as a service systems and architecture;
— storage services;
— security, scalability…