Information technology — Telecommunications and information networks — Part 1AE: Media access contr...
The scope of this standard is to specify provision of connectionless user data confidentiality, frame data
integrity, and data origin authenticity by media access independent protocols and entities that operate
transparently to MAC Clients.
NOTE—The MAC Clients are as specified in IEEE Std 802, IEEE Std 802.2™, IEEE Std 802.1D™, IEEE Std 802.1Q™,
and IEEE Std 802.1X™.2
To this end it
a)…
Control of hazardous energy — Lockout and other methods
1 Scope
1.1 Scope
This Standard specifies requirements for controlling hazardous energy associated with potentially harmful machines, equipment, and processes (including mobile machinery and equipment; see Annex M). Where a CSA Standard or other recognized Standard exists for a specific type of machinery, equipment, or process, it should be used with this Standard to provide the most effective…
Definitions, general requirements, and methods of testing for thermoplastic pressure piping
1 Scope
1.1
This Standard specifies requirements for thermoplastic pressure piping. It includes reference publications, definitions, abbreviations, general requirements for materials and manufactured pipe and fittings, relevant test methods, and marking requirements.
Notes:
1)
The terms “pipe” and “piping”, as well as “tube” and “tubing”, are used interchangeably in the CSA B137 Series.
2…
Information technology — Biometric data interchange formats — Part 11: Signature/sign processed dyna...
1 Scope
For the purpose of biometric comparison, this part of ISO/IEC 19794 specifies a data interchange format for
processed signature/sign behavioural data extracted from a time series, captured using devices such as
digitizing tablets, pen-based computing devices, or advanced pen systems.
The data interchange format is generic, in that it may be applied and used in a wide range of…
IT security techniques — Competence requirements for information security testers and evaluators — P...
1 Scope
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby establishing a basis for shared understanding of the concepts and principles central to the ISO/IEC 19896 series across its user communities. It provides fundamental…
Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms ...
1 Scope
This document specifies anonymous entity authentication mechanisms based on weak secrets. The
precise operation of each mechanism is specified, together with details of all inputs and outputs. This
document is applicable to situations in which the server only verifies that the user belongs to a certain
user group without obtaining any information that can be used to identify the user…
Information technology — Home electronic system (HES) architecture — Part 5-12: Intelligent grouping...
1 Scope
This part of ISO/IEC 14543
– specifies the test and verification methods for an IGRS remote access (RA) user or device,
– defines the structure of a user and device testing system for IGRS remote access,
– describes and specifies the exchange process between a user or device-under-test with a
standard IGRS RA service platform (IRSP), and
– describes and specifies the rules to have…
Information technology — Collection of graphical symbols for office equipment
1 Scope
This document provides a collection of graphical symbols which are used typically on office equipment to aid in the user operation of, for example, personal computers, printers, telephones and copying machines.
These graphical symbols are also used in other application areas if appropriate.
NOTE The graphical symbols in this document are collections of relevant graphical symbols…
Information technology — International string ordering and comparison — Method for comparing charact...
1 Scope
This document defines the following.
— A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings containing characters from the full repertoire of ISO/IEC 10646. This method is also applicable to subsets of that repertoire, such as those of the different ISO/IEC 8-bit…
Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary
1 Scope
This document defines assurance-related terms and establishes an organized set of concepts and
relationships to form a basis for shared understanding across user communities for assurance. It
provides information to users of the other parts of ISO/IEC/IEEE 15026 including the combined use
of multiple parts. The essential concept introduced by ISO/IEC/IEEE 15026 (all parts) is the…