Information security - Anonymous digital signatures - Part 3: Mechanisms using multiple public keys
This document specifies anonymous digital signature mechanisms in which a verifier uses multiple public keys to verify a digital signature.
This document provides:
— a general description of an anonymous digital signature mechanism using multiple public keys;
— a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, this document specifies the process…
Information technology — Information security incident management — Part 4: Coordination
This document provides guidelines for multiple organizations handling information security incidents in a coordinated manner. It also addresses the impacts of external cooperation on the internal incident management of an individual organization and provides guidelines for an individual organization to adapt to the coordination process. Furthermore, it provides guidelines for the coordination…
Non-active surgical implants — Mammary implants — Specific requirements
This document specifies specific requirements for mammary implants. With regard to safety, this document specifies requirements for intended performance, design attributes, materials, design evaluation, manufacturing, packaging, sterilization and information supplied by the manufacturer.
Implants chirurgicaux non actifs — Implants mammaires — Exigences particulières
Le présent document spécifie les exigences spécifiques relatives aux implants mammaires. En matière de sécurité, le présent document spécifie des exigences relatives aux performances prévues, aux caractéristiques de conception, aux matériaux, à l'évaluation de la conception, à la fabrication, à l'emballage, à la stérilisation et aux informations fournies par le fabricant.
Information technology - Information security incident management - Part 4: Coordination
This document provides guidelines for multiple organizations handling information security incidents in a coordinated manner. It also addresses the impacts of external cooperation on the internal incident management of an individual organization and provides guidelines for an individual organization to adapt to the coordination process. Furthermore, it provides guidelines for the coordination…
Electronic fee collection — Support for traffic management
This document identifies the architecture of a toll system environment in which a toll charger (TC) can act to support traffic management with the use of a tariff scheme.
This document defines:
— the architecture relevant to the scope of this document;
— a standard framework and data flow model;
— an exchange of information between a TC and a road and traffic manager (RTM), e.g.:
— …
Electronic fee collection — Requirements for EFC application interfaces on common media
This document defines requirements to support information exchanges among related entities of a common payment scheme. It defines:
a) EFC-related functional requirements for a common payment medium;
b) an application structure in a common payment medium;
c) EFC application data in a common payment medium.
The following is outside the scope of this document:
— requirements…
Information technology - Cloud computing and distributed platforms - Framework and concepts for orga...
This document specifies concepts related to the intersection of digital sovereignty, organizational autonomy, and digital platform, and provides a framework enabling organizations to address these concepts.
This document is applicable to all organizations and policy makers involved in organizational autonomy and digital sovereignty in cloud services and distributed platforms.