Information technology — Business Operational View — Part 5: Identification and referencing of requi...
1.1 Statement of scope
The modelling of a business transaction through scenarios and scenario components is done by specifying
the applicable constraints through explicitly stated rules. The Open-edi Reference Model identified two basic
classes of constraints, namely “internal constraints” and “external constraints” (see further Annex G).
ISO/IEC 15944-4 focuses on internal constraints with a…
Interpreting — Guidelines for community interpreting
ISO 13611:2014 establishes criteria and recommendations for community interpreting during oral and signed communication that enables access to services for people who have limited proficiency in the language of such services. Community interpreting occurs in a wide variety of private and public settings and supports equal access to community and/or public services.
ISO 13611:2014 addresses…
Health informatics — Privilege management and access control — Part 1: Overview and policy managemen...
ISO 22600 defines principles and specifies services needed for managing privileges and access control to data and/or functions.
It focuses on communication and use of health information distributed across policy domain boundaries. This includes healthcare information sharing across unaffiliated providers of healthcare, healthcare organizations, health insurance companies, their patients, staff…
Health informatics — Privilege management and access control — Part 2: Formal models
ISO 22600 defines principles and specifies services needed for managing privileges and access control to data and/or functions.
It focuses on communication and use of health information distributed across policy domain boundaries. This includes healthcare information sharing across unaffiliated providers of healthcare, healthcare organizations, health insurance companies, their patients, staff…
Health informatics — Privilege management and access control — Part 3: Implementations
ISO 22600 defines principles and specifies services needed for managing privileges and access control to data and/or functions.
It focuses on communication and use of health information distributed across policy domain boundaries. This includes healthcare information sharing across unaffiliated providers of healthcare, healthcare organizations, health insurance companies, their patients, staff…
Scope
Notes:
1) For requirements pertaining to loads acting on connectors, see CSA S304.
2) For requirements pertaining to installation of masonry connectors, see CSA A371.
1.1
This Standard specifies minimum requirements for designing the following masonry connectors:
a) ties used to
i) interconnect the wythes of a masonry wall; or
ii) attach masonry veneer to its…
Method of test for evaluation of truss plates used in lumber joints
Scope
1.1
This Standard provides basic procedures based on joint ultimate load or a limiting slip for the determination of the lateral strength resistance and lateral slip resistance of truss plate teeth embedded in sawn and structural composite lumber members.
1.2
This Standard provides for the determination of the lateral strength resistance and lateral slip resistance of nails embedded…
Antennas, towers, and antenna-supporting structures
Scope
1.1 General
This Standard applies to structural antennas, towers, antenna-supporting structures, and roof- and wall-mounted structures, including their components, such as guys and foundations. It covers the structural design, fabrication, and erection of new structures and the modification of existing structures.
1.2 Exclusions
This Standard is not intended to apply to
a)…
Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms usi...
ISO/IEC 20008-2:2013 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
It provides
a general description of an anonymous digital signature mechanism using a group public key;
a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, ISO/IEC 20008-2:2013 specifies
the process for…
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms usi...
ISO/IEC 20008-2:2013 specifies anonymous digital signature mechanisms, in which a verifier makes use of a group public key to verify a digital signature.
It provides
a general description of an anonymous digital signature mechanism using a group public key;
a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, ISO/IEC 20008-2:2013 specifies
the process for…