Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series.
It provides requirements and recommendations to the developer and the evaluator for the supplementary activities on biometric recognition performance specified in ISO/…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides recommendations and requirements to the developer and the evaluator for the supplementary activities on presentation attack detection specified in ISO/IEC 19989-1…
Information technology for learning, education and training — Reference framework of e-Portfolio inf...
1 Scope
This document specifies a reference framework of e-Portfolio implementation that can be used to inform and support development of ITLET systems that meet the requirements of learners, instructors, e-learning service providers and others in contexts such as K-12 education, higher education, training and personal development.
The reference framework identifies content and functional…
Information technology — Big data reference architecture — Part 4: Security and privacy
1 Scope
This document specifies the security and privacy aspects applicable to the big data reference architecture (BDRA) including the big data roles, activities and functional components and also provides guidance on security and privacy operations for big data.
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
1 Scope
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use…
Information technology — Information security incident management — Part 3: Guidelines for ICT incid...
1 Scope
This document gives guidelines for information security incident response in ICT security operations. This document does this by firstly covering the operational aspects in ICT security operations from a people, processes and technology perspective. It then further focuses on information security incident response in ICT security operations including information security incident…
Internet of things (IOT) — Wireless sensor network system supporting electrical power substation
1 Scope
This document specifies
– intelligent wireless sensor network (iWSN) from the perspectives of iWSN's system
infrastructure and communications internal and external to the infrastructure, and
– technical requirements for iWSN to realize smart electrical power substations.
Internet of things (IoT) — Data exchange platform for IoT services — Part 1: General requirements an...
1 Scope
This document specifies requirements for an Internet of Things (IoT) data exchange platform
for various services in the technology areas of:
• the middleware components of communication networks allowing the co-existence of IoT
services with legacy services;
• the end-points performance across the communication networks among the IoT and legacy
services;
• the IoT specific…
Information technology — Business operational view — Part 14: Open-edi reference model and cloud com...
1 Scope
This document:
— examines the basic concepts that have been developed for both cloud computing and Open-edi;
— identifies key Open-edi concepts relevant to cloud computing;
— identifies key cloud computing concepts relevant to Open-edi;
— compares Open-edi model and cloud computing architecture and identifies mappings (similarities in whole or in part) between them using formal…
Information technology database languages — Guidance for the use of database language SQL — Part 9: ...
1 Scope
This document discusses the syntax and semantics for including online analytic processing (OLAP)
capabilities in SQL, as defined in ISO/IEC 9075-2.
It discusses the following features regarding OLAP capabilities of the SQL language:
— Feature T611, “Elementary OLAP operations”,
— Feature T612, “Advanced OLAP operations”,
— Feature T614, “NTILE function”,
— Feature T615, “LEAD and…