Programming languages — Fortran — Part 1: Base language
1 Scope
This document specifies the form and establishes the interpretation of programs expressed in the base Fortran
language. The purpose of this document is to promote portability, reliability, maintainability, and efficient
execution of Fortran programs for use on a variety of computing systems.
This document specifies
• the forms that a program written in the Fortran language can take…
Information security — Secure multiparty computation — Part 1: General
1 Scope
This document specifies definitions, terminology and processes for secure multiparty computation and related technology, in order to establish a taxonomy and enable interoperability. In particular, this document defines the processes involved in cryptographic mechanisms which compute a function on data while the data are kept private; the participating parties; and the cryptographic…
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
1 Scope
This document specifies the processes for secure multiparty computation mechanisms based on the secret sharing techniques which are specified in ISO/IEC 19592-2. Secure multiparty computation based on secret sharing can be used for confidential data processing. Examples of possible applications include collaborative data analytics or machine learning where data are kept secret, secure…
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 1: Overview, t...
1 Scope
This document provides the means for understanding and associating the individual documents of the ISO/IEC 5259 series and is the foundation for conceptual understanding of data quality for analytics and machine learning. It also discusses associated technologies and examples (e.g. use cases and usage scenarios).
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 3: Data qualit...
1 Scope
This document specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving the quality of data used in the areas of analytics and machine learning.
This document does not define a detailed process, methods or metrics. Rather it defines the requirements and guidance for a quality management process along with a reference process and…
Artificial intelligence — Data quality for analytics and machine learning (ML) — Part 4: Data qualit...
1 Scope
This document establishes general common organizational approaches, regardless of the type, size or nature of the applying organization, to ensure data quality for training and evaluation in analytics and machine learning (ML). It includes guidance on the data quality process for:
— supervised ML with regard to the labelling of data used for training ML systems, including common…
Information technology — Security techniques — Testing methods for the mitigation of non-invasive at...
1 Scope
This document specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790:2012 for security levels 3 and 4. The test metrics are associated with the security functions addressed in ISO/IEC 19790:2012. Testing is conducted at the defined boundary of the cryptographic module and the inputs/outputs available at its…
Test methods for machine readable travel documents (MRTD) and associated devices — Part 1: Physical ...
1 Scope
This document provides a set of instructions for evaluation of MRPs which may incorporate contactless integrated circuits. This evaluation is an instrument to establish the ability in principle of a specific type of document to fulfil the requirements of use. It supplies a structured approach to evaluate MRPs by:
— defining reproducible stress methods to submit the document(s) under…
Internet of things (IoT) and digital twin — Vocabulary
1 Scope
This document provides a definition of Internet of Things and digital twin along with a set of
terms and definitions. This document is a terminology foundation for the Internet of Things and
digital twin.
Information security — Security requirements, test and evaluation methods for quantum key distributi...
1 Scope
This document specifies a general framework for the security evaluation of quantum key distribution (QKD) according to the ISO/IEC 15408 series. Specifically, it specifies a baseline set of common security functional requirements (SFRs) for QKD modules, including SFRs on the conventional network components and the quantum optical components, and the entire implementation of QKD protocols…