Information technology — Systems and software Quality Requirements and Evaluation (SQuaRE) — Measure...
1 Scope
This document defines quality measures useful for requirements and evaluation of IT service quality in terms of characteristics and sub-characteristics defined in ISO/IEC TS 25011.
This document contains a basic set of quality measures for each characteristic and sub-characteristic.
This document does not assign ranges of values of the quality measures to rated levels or to grades of…
Information technology, cybersecurity and privacy protection — Cybersecurity framework development g...
1 Scope
This document specifies guidelines for developing a cybersecurity framework. It is applicable to cybersecurity framework creators regardless of their organizations’ type, size or nature.
Privacy protection — Privacy guidelines for smart cities
1 Scope
The document takes a multiple agency as well as a citizen-centric viewpoint.
It provides guidance on:
— smart city ecosystem privacy protection;
— how standards can be used at a global level and at an organizational level for the benefit of citizens; and
— processes for smart city ecosystem privacy protection.
This document is applicable to all types and sizes of organizations,…
Information technology — Process assessment — Process assessment model for software life cycle proce...
1 Scope
This document defines a process assessment model for software life cycle processes, conformant with the requirements of ISO/IEC 33004, for use in performing a conformant assessment in accordance with the requirements of ISO/IEC 33002.
1 Scope
This document specifies the key requirements of a quality open source license compliance program in
order to provide a benchmark that builds trust between organizations exchanging software solutions
comprised of open source software.
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechani...
1
Scope
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block ciphers specified in ISO/IEC 18033-3 and the stream ciphers specified in ISO/IEC 18033-4:
a)
UMAC;
b)
Badger;
c)
Poly1305-AES;
d)
GMAC.
Information technology — Implementation and operation of customer premises cabling — Part 4: Measure...
1 Scope
This part of ISO/IEC 14763 specifies the measurement of two- and four-pair balanced cabling
of
a) end-to-end (E2E) link Class D, E and EA;
b) modular plug terminated links (MPTLs) of Class D, E, EA, F, FA and of Class I and II;
c) direct attach cabling of Class D, E, EA, F, FA and of Class I and II.
The free connectors which terminate two and four pairs in field and laboratory…
Information security — Redaction of authentic data — Part 1: General
1 Scope
This document specifies properties of cryptographic mechanisms to redact authentic data. In particular, it defines the processes involved in those mechanisms, the participating parties, and the cryptographic properties.
Information technology — Storage management — Part 1: Overview
1 Scope
This Technical Specification defines an interface for the secure, extensible, and interoperable
management of a distributed and heterogeneous storage system. This interface uses an object-oriented,
XML-based, messaging-based protocol designed to support the specific requirements of managing
devices and subsystems in this storage environment. Using this protocol, this Technical…
Information technology — Storage management — Part 2: Common Architecture
1 Scope
Storage Management Technical Specification, Part 2 Common Architecture, 1.8.0 Rev 4 defines the core
architecture and protocols in SMI-S. The components of SMI-S architecture include:
• Transport - communicating management information between constituents of the management system
• Health and fault management - detecting failures through monitoring the state of storage components
•…