Information technology — Metamodel framework for interoperability (MFI) — Part 3: Metamodel for onto...
1 Scope
This document specifies the metamodel that provides a facility to register administrative and evolution information related to ontologies.
The metamodel is intended to promote interoperability among application systems, by providing administrative and evolution information related to ontologies, accompanied with standardized ontology repositories that register ontologies themselves in…
1 Scope
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data;
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;
— data origin authentication, i.e.…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies:
— extended security functional components to SFR Classes in ISO/IEC 15408-2;
— supplementary activities to methodology specified in ISO/IEC 18045 for SAR Classes of ISO/IEC 15408-3.
This document…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series.
It provides requirements and recommendations to the developer and the evaluator for the supplementary activities on biometric recognition performance specified in ISO/…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides recommendations and requirements to the developer and the evaluator for the supplementary activities on presentation attack detection specified in ISO/IEC 19989-1…
Information technology for learning, education and training — Reference framework of e-Portfolio inf...
1 Scope
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and personal development.
The reference framework identifies content and functional…
Information technology — Big data reference architecture — Part 4: Security and privacy
1 Scope
This document specifies the security and privacy aspects applicable to the big data reference architecture (BDRA) including the big data roles, activities and functional components and also provides guidance on security and privacy operations for big data.
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
1 Scope
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use…
Information technology — Information security incident management — Part 3: Guidelines for ICT incid...
1 Scope
This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and technology perspective. It then further focuses on information security incident response in ICT security operations including information security incident…
Internet of things (IOT) — Wireless sensor network system supporting electrical power substation
1 Scope
This document specifies
– intelligent wireless sensor network (iWSN) from the perspectives of iWSN's system
infrastructure and communications internal and external to the infrastructure, and
– technical requirements for iWSN to realize smart electrical power substations.