ISO/IEC CD 23837-1.2
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
Information technology security techniques — Security requirements, test and evaluation methods for quantum key distribution — Part 1: Requirements
This document establishes core principles, including privacy, for the purpose of enabling agerelated eligibility decisions, by setting out a framework for indicators of confidence about age or an age range of a natural person.
This international standard provides guidance on implementing user authentication and the use of credentials therein, in particular it: -- describes complementary models for implementing authentication with different operational aspects. -- specifies formal descriptions of authentication methods. -- specifies requirements for authenticators as credentials -- managing the lifecycle, -- binding to a principal, -- use in a federated context.
ISO/IEC TR 24729-2:2008 describes the potential for use of radio-frequency identification (RFID) as a significant enabler in the recycling of various types of products; notably home appliances and electronics. It identifies various recycling streams that are challenged by the possibility of RF tags being attached to recycled material, notably glass and steel.
This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities. Firstly, it establishes an overall framework for all the indicators. Then, it specifies the name, description, classification and measurement method for each indicator.
This document describes the basic concept of metadata, and its relationship to both data and metamodels.
The purpose of this technical report is to describe a set of procedures for the consistent registration of value domains and their attributes in a registry. This technical report is not a data entry manual, but a user's guide for conceptualizing a value domain and its components for the purpose of consistently establishing good quality metadata. An organization may adapt and/or add to these procedures as necessary.
This document provides principles for IoT trustworthiness based on ISO/IEC 30141 – IoT Reference Architecture.
This International Standard provides a definition of Internet of Things along with a set of terms and definitions. This International Standard is a terminology foundation for the Internet of Things.
Provides a framework for managing entity authentication assurance in a given context.
ISO/IEC 29161:2016 establishes a unique identification scheme for the Internet of Things (IoT), based on existing and evolving data structures. This International Standard specifies the common rules applicable for unique identification that are required to ensure full compatibility across different identities. The unique identification is a universal construct for any physical object, virtual object, or person. It is used in IoT information systems that need to track or otherwise refer to entities. It is intended for use with any IoT media.