TCI
Available Standards (251)
Showing standards 193 - 216
Standard
Referrer Policy
This document describes how an author can set a referrer policy for documents they crea... Thu, Jan 26 2017Standard
ISO/TR 22100-4:2018
Relationship with ISO 12100 — Part 4: Guidance to machinery manufacturers for consideration of related IT-security (cyber security) aspects.
This document gives machine manufacturers guidance on potential security aspects in rel... Sat, Dec 1 2018Standard
ISO/IEC 19592-1:2016
Secret sharing -- Part 1: General
ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their prop... Tue, Nov 1 2016Standard
ISO/IEC 19592-2:2017
Secret sharing -- Part 2: Fundamental mechanisms
This document specifies cryptographic secret sharing schemes. Sun, Oct 1 2017Standard
NIST Special Publication 800-53 Revision 4
Security and Privacy Controls for Federal Information Systems and Organizations
This publication provides a catalog of security and privacy controls for federal inform... Mon, Apr 1 2013Security as a Service
The purpose of this research will be to identify consensus definitions of what Security...Standard
Security Assertion Markup Language (SAML) v2.0
The Security Assertion Markup Language (SAML), developed by the Security Services Techn... Sun, Mar 1 2015Standard
ISO/IEC TR 19791:2010
Security assessment of operational systems
This Technical Report provides guidance and criteria for the security evaluation of ope... Thu, Apr 1 2010Standard
ISO/IEC TR 15443-1:2012
Security assurance framework -- Part 1: Introduction and concepts
This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised ... Thu, Nov 1 2012Standard
ISO/IEC TR 15443-2:2012
Security assurance framework -- Part 2: Analysis
This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. I... Thu, Nov 1 2012Working group
CEN/CLC/JTC 13/WG 3
Security evaluation and assessment
Security evaluation and assessmentStandard
ISO/IEC 19792:2009
Security evaluation of biometrics
This International Standard specifies the subjects to be addressed during a security ev... Sat, Aug 1 2009Standard
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success provides a practical reference... Fri, Dec 1 2017Standard
ITU-T X.1601
Security framework for cloud computing
Recommendation ITU-T X.1601 describes the security framework for cloud computing. The R... Thu, Oct 1 2015Security Guidance
Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Comput...Standard
ISO/IEC 15816:2002
Security information objects for access control
The scope of this Recommendation | International Standard is: a) the definition of guid... Fri, Feb 1 2002Standard
ISO 28004-2:2014
Security management systems for the supply chain - Guidelines for the implementation of ISO 28000 - Part 2: Guidelines for adopting ISO 28000 for use in medium and small seaport operations
This part of ISO 28004 identifies supply chain risk and threat scenarios, procedures fo... Sat, Feb 1 2014ITU-T X.1040
Security reference architecture for lifecycle management of e-commerce business data
Recommendation ITU-T X.1040 analyses the main features and typical threats faced by e‑c... Sat, Oct 14 2017Standard
ISO/IEC 19790:2012
Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within... Wed, Aug 1 2012ITU-T X.1044
Security requirements of network virtualization
The Recommendation X.1044 analyses security challenges and threats on Network Virtualiz... Thu, Oct 31 2019Standard
ETSI TS 118 103 V2.12.1
Security solutions (oneM2M TS-0003 version 2.12.1 Release 2A)
The present document defines security solutions applicable within the M2M system. ... Mon, Apr 1 2019Working group
STWG
Security TWG
The Security TWG provides architectures and frameworks for the establishment of informa...Standard
ISO/IEC 19086-4:2019