Water quality — Determination of microcystins — Method using liquid chromatography and tandem mass s...
This document specifies a method for the quantification of twelve microcystin variants (microcystin-LR, -LA, -YR, -RR, -LY, -WR, -HtyR, -HilR, -LW, -LF, [Dha7]-microcystin-LR, and [Dha7]-microcystin-RR) in drinking water and freshwater samples between 0,05 µg/l to 1,6 µg/l. The method can be used to determine further microcystins, provided that analytical conditions for chromatography and mass…
Acoustique — Bruit des stands de tir — Partie 6: Mesurages de la pression sonore près de la source p...
Le présent document spécifie des méthodes d’enregistrement de la pression acoustique en fonction du temps produite soit par le tir avec des armes de calibres inférieurs à 20 mm, soit par la détonation de charges explosives de moins de 50 g d’équivalent TNT, à l’intérieur d’un stand de tir, à des emplacements d’intérêt, relativement à l’exposition sonore du tireur ou de toute autre personne se…
Determination of the resistance to jet fires of passive fire protection materials — Part 1: General ...
This document describes a method of determining the resistance to jet fires of passive fire protection materials and systems. It gives an indication of how passive fire protection materials behave in a jet fire and provides performance data under the specified conditions.
It does not include an assessment of other properties of the passive fire protection material such as weathering, ageing,…
Information technology — Open systems interconnection — Part 7: The Directory: Selected object class...
1 Scope
This Recommendation | International Standard defines a number of object classes and name forms which may be found useful across a range of applications of the Directory. The definition of an object class involves listing a number of attribute types which are relevant to objects of that class. The definition of a name form involves naming the object class to which it applies and listing…
Information technology — Open systems interconnection — Part 8: The Directory: Public-key and attrib...
1 Scope
This Recommendation | International Standard addresses some of the security requirements in the areas of authentication and other security services through the provision of a set of frameworks upon which full services can be based. Specifically, this Recommendation | International Standard defines frameworks for:
–public-key certificates; and
–attribute certificates.
The public-key…
Information technology — Open systems interconnection — Part 9: The Directory: Replication
1 Scope
This Recommendation | International Standard specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
Information technology — Open systems interconnection directory — Part 11: Protocol specifications f...
1 Scope
The scope of this Recommendation | International Standard is threefold.
This Recommendation | International Standard provides guidance on how to prepare new and old protocols for cryptographic algorithm migration, and defines auxiliary cryptographic algorithms to be used for migration purposes.
This Recommendation | International Standard specifies a general wrapper protocol that…
Information technology — Metamodel framework for interoperability (MFI) — Part 3: Metamodel for onto...
1 Scope
This document specifies the metamodel that provides a facility to register administrative and evolution information related to ontologies.
The metamodel is intended to promote interoperability among application systems, by providing administrative and evolution information related to ontologies, accompanied with standardized ontology repositories that register ontologies themselves in…
1 Scope
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data;
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;
— data origin authentication, i.e.…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies:
— extended security functional components to SFR Classes in ISO/IEC 15408-2;
— supplementary activities to methodology specified in ISO/IEC 18045 for SAR Classes of ISO/IEC 15408-3.
This document…