Determination of the resistance to jet fires of passive fire protection materials — Part 1: General ...
This document describes a method of determining the resistance to jet fires of passive fire protection materials and systems. It gives an indication of how passive fire protection materials behave in a jet fire and provides performance data under the specified conditions.
It does not include an assessment of other properties of the passive fire protection material such as weathering, ageing,…
Information technology — Open systems interconnection — Part 7: The Directory: Selected object class...
1 Scope
This Recommendation | International Standard defines a number of object classes and name forms which may be found useful across a range of applications of the Directory. The definition of an object class involves listing a number of attribute types which are relevant to objects of that class. The definition of a name form involves naming the object class to which it applies and listing…
Information technology — Open systems interconnection — Part 8: The Directory: Public-key and attrib...
1 Scope
This Recommendation | International Standard addresses some of the security requirements in the areas of authentication and other security services through the provision of a set of frameworks upon which full services can be based. Specifically, this Recommendation | International Standard defines frameworks for:
–public-key certificates; and
–attribute certificates.
The public-key…
Information technology — Open systems interconnection — Part 9: The Directory: Replication
1 Scope
This Recommendation | International Standard specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated, using the defined protocol, thereby improving the service provided to users of the Directory.
Information technology — Open systems interconnection directory — Part 11: Protocol specifications f...
1 Scope
The scope of this Recommendation | International Standard is threefold.
This Recommendation | International Standard provides guidance on how to prepare new and old protocols for cryptographic algorithm migration, and defines auxiliary cryptographic algorithms to be used for migration purposes.
This Recommendation | International Standard specifies a general wrapper protocol that…
Information technology — Metamodel framework for interoperability (MFI) — Part 3: Metamodel for onto...
1 Scope
This document specifies the metamodel that provides a facility to register administrative and evolution information related to ontologies.
The metamodel is intended to promote interoperability among application systems, by providing administrative and evolution information related to ontologies, accompanied with standardized ontology repositories that register ontologies themselves in…
1 Scope
This document specifies five methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data;
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified;
— data origin authentication, i.e.…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric recognition performance and presentation attack detection for biometric verification systems and biometric identification systemsthis document specifies:
— extended security functional components to SFR Classes in ISO/IEC 15408-2;
— supplementary activities to methodology specified in ISO/IEC 18045 for SAR Classes of ISO/IEC 15408-3.
This document…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to the security evaluation of biometric recognition performance applying the ISO/IEC 15408 series.
It provides requirements and recommendations to the developer and the evaluator for the supplementary activities on biometric recognition performance specified in ISO/…
Information security — Criteria and methodology for security evaluation of biometric systems — Part ...
1 Scope
For security evaluation of biometric verification systems and biometric identification systems, this document is dedicated to security evaluation of presentation attack detection applying the ISO/IEC 15408 series. It provides recommendations and requirements to the developer and the evaluator for the supplementary activities on presentation attack detection specified in ISO/IEC 19989-1…