Information technology — Multimedia content description interface — Part 6: Reference software
The ISO/IEC 15938 series operates on and generates conformant bitstreams. This document provides a specific implementation that behaves in a conformant manner.
NOTE 1 Other implementations that conform to the ISO/IEC 15938 series are possible, which do not necessarily use the algorithms or the programming techniques of the reference software.
The software contained in this document is known…
Programming languages — Guidance to avoiding vulnerabilities in programming languages — Part 3: C
This document specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In general, this guidance is applicable to the software developed, reviewed, or maintained for any application.
This document describes the way that the vulnerabilities listed in…
Programming languages - Guidance to avoiding vulnerabilities in programming languages - Part 3: C
This document specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In general, this guidance is applicable to the software developed, reviewed, or maintained for any application.
This document describes the way that the vulnerabilities listed in…
Programming languages — Guidance to avoiding vulnerabilities in programming languages — Part 2: Ada
This document specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In general, this document is applicable to the software developed, reviewed or maintained for any application.
Vulnerabilities described in this document present the way that the…
Programming languages - Guidance to avoiding vulnerabilities in programming languages - Part 2: Ada
This document specifies software programming language vulnerabilities to be avoided in the development of systems where assured behaviour is required for security, safety, mission-critical and business-critical software. In general, this document is applicable to the software developed, reviewed or maintained for any application.
Vulnerabilities described in this document present the way that the…
Information technology — Genomic information representation — Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines:
— metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6);
— protection elements providing confidentiality, integrity and privacy rules at the different…
Information technology - Genomic information representation - Part 3: Metadata and application progr...
This document specifies information metadata, auxiliary fields, SAM interoperability, protection metadata and programming interfaces of genomic information. It defines:
— metadata storage and interpretation for the different encapsulation levels as specified in ISO/IEC 23092-1 (in Clause 6);
— protection elements providing confidentiality, integrity and privacy rules at the different…
Information technology — Conformance testing for the biometric application programming interface (Bi...
1 Scope
This part of ISO/IEC 24709 defines a number of test assertions written in the assertion language specified in
ISO/IEC 24709-1.
This part of ISO/IEC 24709 specifies what subset of all the test assertions defined herein are to be executed
for each of the five conformance subclasses of BSPs defined in ISO/IEC 19784-1 (BioAPI 2.0). It also
specifies additional assertions that are to be…
Information technology — Conformance testing for the biometric application programming interface (Bi...
1 Scope
This part of ISO/IEC 24709 defines a number of test assertions written in the assertion language specified in
ISO/IEC 24709-1:2007.
This part of ISO/IEC 24709 specifies all the test assertions that are to be executed for conformance testing of
BioAPI frameworks claiming conformance to ISO/IEC 19784-1 (BioAPI 2.0).
Test assertions specified in this part of ISO/IEC 24709 are not…
Systems and software engineering — Life cycle management — 7: Application of systems engineering on ...
1.1 Scope
This standard establishes the requirements for systems engineering activities to be performed on projects of
the United States (US) Department of Defense (DoD) and other defense agencies across the entire system
life cycle, including the planning, acquisition, modification, and sustainment of defense systems. It
provides the foundation for systems engineering within the context of…