Information security — Encryption algorithms — Part 1: General
This document is general in nature and provides definitions that apply in subsequent parts of the ISO/IEC 18033 series.
It introduces the nature of encryption and describes certain general aspects of its use and properties.
Information security - Encryption algorithms - Part 1: General
This document is general in nature and provides definitions that apply in subsequent parts of the ISO/IEC 18033 series.
It introduces the nature of encryption and describes certain general aspects of its use and properties.
Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens
This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is, such time-stamp tokens are not linked.
Cybersecurity — Supplier relationships — Part 1: Overview and concepts
This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier relationships. It also introduces concepts that are described in detail in the other parts of ISO/IEC 27036. This document addresses perspectives of both acquirers and suppliers.
Cybersecurity - Supplier relationships - Part 1: Overview and concepts
This document is an introductory part of ISO/IEC 27036. It provides an overview of the guidance intended to assist organizations in securing their information and information systems within the context of supplier relationships. It also introduces concepts that are described in detail in the other parts of ISO/IEC 27036. This document addresses perspectives of both acquirers and suppliers.
Information security - Time-stamping services - Part 2: Mechanisms producing independent tokens
This document specifies mechanisms that generate, renew, and verify independent time-stamps. In order to verify an independent time-stamp token, time-stamp verifiers do not need access to any other time-stamp tokens. That is, such time-stamp tokens are not linked.
This document specifies the names of the components intended to be used in the standards, for harmonization purposes.
It establishes the correspondence between the English and French names and gives the corresponding CAS Registry Number (CAS RN®)[1] for each component.
It is applicable to all standards of the field “Essential oils”.
[1] CAS Registry Number® (CAS RN®) is a trademark of CAS…