Matériel agricole — Sécurité — Partie 1 : Exigences générales
1 Domaine d’application
La présente partie de l’ISO 4254 spécifie les exigences de sécurité et les moyens pour leur vérification pour
la conception et la construction des machines automotrices, portées, semi-portées et traînées utilisées
en agriculture afin de traiter des phénomènes dangereux typiques pour la plupart des machines. En
outre, elle spécifie le type d’informations sur les…
Definitions, general requirements, and methods of testing for thermoplastic pressure piping
1 Scope
1.1
This Standard specifies requirements for thermoplastic pressure piping. It includes reference publications, definitions, abbreviations, general requirements for materials and manufactured pipe and fittings, relevant test methods, and marking requirements.
Notes:
1)
The terms “pipe” and “piping”, as well as “tube” and “tubing”, are used interchangeably in the CSA B137 Series.
2…
Information technology — Security techniques — Anonymous entity authentication — Part 2: Mechanisms ...
1 Scope
This part of ISO/IEC 20009 specifies anonymous entity authentication mechanisms based on signatures
using a group public key in which a verifier verifies a group signature scheme to authenticate the entity
with which it is communicating, without knowing this entity’s identity.
This part of ISO/IEC 20009 provides
— a general description of an anonymous entity authentication mechanism…
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information managemen...
1 Scope
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.
This document specifies PIMS-related requirements and provides guidance for PII…
Information technology — Security techniques — Key management — Part 6: Key derivation
1 Scope
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation functions based on MAC algorithms and on hash-functions are specified.
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — P...
1 Scope
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192-4, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3 and ISO/IEC 18033-2.
This document is applicable to cryptographic…
Ergonomie de l'interaction homme-système — Partie 210: Conception centrée sur l'opérateur ...
1 Domaine d’application
Le présent document spécifie des exigences et des recommandations relatives aux principes et aux activités de conception centrée sur l’opérateur humain, intervenant tout au long du cycle de vie des systèmes informatiques interactifs. Il est destiné à être utilisé par les responsables de la gestion des processus de conception et traite des manières dont les composants…
Security and resilience — Community resilience — Guidelines for conducting peer reviews
This document gives guidelines for organizations to design, organize, conduct, receive feedback from and learn from a peer review of their disaster risk reduction (DRR) policies and practices. It is also applicable to other community resilience activities. It is intended for use by organizations with the responsibility for, or involvement in, managing such activities including policy and…
1 Domaine d’application
1.1 Ces exigences s’appliquent aux systèmes de stockage de l’énergie (ESS) destinés à recevoir de
l’énergie et à l’emmagasiner sous une forme qui peut approvisionner en énergie électrique, selon la
nécessité, des charges ou le système d’alimentation électrique (EPS) local/d’un secteur. La présente
norme traite des modes de stockage de l’énergie suivants :…
Power systems management and associated information exchange - Data and communications security - Pa...
IEC 62351-3:2014+A1:2018+A2:2020 specifies how to provide confidentiality, integrity protection, and message level authentication for SCADA and telecontrol protocols that make use of TCP/IP as a message transport layer when cyber-security is required. Although there are many possible solutions to secure TCP/IP, the particular scope of this part is to provide security between communicating…