IT Security

Available (316)

Showing 301 - 312 per page



Authenticated encryption

This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
— data confidentiality, i.e. protection against unauthorized disclosure of data,
— data integrity, i.e. protection that enables the recipient of data to verify that it has not been modified,
— data origin authentication, i.e. protection that enables the recipient of data to verify the identity of the data originator.

ISO/IEC 19772:2009

Guidance for developing security and privacy functional requirements based on ISO/IEC 15408

This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII);
— the procedure to define both privacy and security functional requirements in a coordinated manner; and
— developing privacy functional requirements as extended components based on the privacy principles defined in ISO/IEC 29100 through the paradigm described in ISO/IEC 15408-2.

ISO/IEC TS 19608:2018

Secret sharing -- Part 1: General

ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties. This document defines the parties involved in a secret sharing scheme, the terminology used in the context of secret sharing schemes, the parameters and the properties of such a scheme.

ISO/IEC 19592-1:2016

Catalogue of architectural and design principles for secure products, systems and applications

This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those principles effectively.
This document gives guidelines for the development of secure products, systems and applications including a more effective assessment with respect to the security properties they are supposed to implement.
This document does not establish any requirements for the evaluation or the assessment process or implementation.

ISO/IEC TS 19249:2017

Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII

This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.

ISO/IEC 19086-4:2019

Blind digital signatures -- Part 2: Discrete logarithm based mechanisms

This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures. The variants are blind digital signature mechanisms with partial disclosure, blind digital signature mechanisms with selective disclosure and traceable blind digital signature mechanisms. The security of all the mechanisms in this part of ISO/IEC 18370 is based on the discrete logarithm problem.

ISO/IEC 18370-2:2016

Random bit generation

This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.
This International Standard
• specifies the characteristics of the main elements required for a non-deterministic random bit generator,
• specifies the characteristics of the main elements required for a deterministic random bit generator,
• establishes the security requirements for both the non-deterministic and the deterministic random bit generator.

ISO/IEC 18031:2011

CEN/TC 224 - Personal identification and related personal devices with secure element, systems, operations and privacy in a multi sectorial environment

CEN/TC 224 multi-sectorial environment involves sectors such as Government/Citizen, Transport, Banking, e-Health, as well as Consumers and providers from the supply side such as card manufacturers, security technology, conformity assessment body, software manufacturers.

Biometrics

Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.

Generic human biometric standards include: common f ile frameworks; biometric application programming interfaces; biometric data interchange formats; related biometric profiles; application of evaluation criteria to biometric technologies; methodologies for performance testing and reporting and cross jurisdictional and societal aspects.

Excluded is the work in ISO/IEC JTC 1/SC 17 to apply biometric technologies to cards and personal identification. Excluded is the work in ISO/IEC JTC 1/SC 27 for biometric data protections techniques, biometric security testing, evaluations and evaluations methodologies.

ISO/IEC JTC 1/SC 37

Key Management Interoperability Protocol ProfilesVersion 2.0

This standard specifies conformance clauses in accordance with the OASIS TC Process ([TC-PROC] section 2.2.6 for the KMIP Specification [KMIP-SPEC] for a KMIPserver or KMIP client through profiles that define the use of KMIP objects, attributes, operations, message elements and authentication methods within specific contexts of KMIP server and client interaction.These profiles define a set of normative constraints for employing KMIP within a particular environment or context of use. They may, optionally, require the use of specific KMIP functionality or in other respects define the processing rules to be followed by profile actors.