Available Standards (627)
Showing standards 1 - 200
ISO/IEC - JTC 1/SC 27 - 27005:2018
This document provides guidelines for information security risk management in an organization. However, this document does not provide any specific method for information security risk management.
ISO/IEC - JTC 1/SC 27 - 27005:2018
This document provides guidelines for information security risk management in an organization. However, this document does not provide any specific method for information security risk management.
"‘Primary batteries - Part 6: guidance on environmental aspects’ "
IEC 60086-6:2020 applies to all chemistries of portable primary cel
Appliance couplers for household and similar general purposes -Part 1: General requirements
This part of lEC 60320 sets the general requirements for appliance couplers for two poles andtwo poles with earth contact and for the connection of electrical devices for household andsimilar onto the
Application of risk management for IT-networks incorporating medical devices — Part 2-2: Guidance for the communication of medical device security needs, risks and controls
This part of IEC 80001 creates a framework for the disclosure of security-related capabilities and risks necessary for managing the risk in connecting medica
Artificial Intelligence
Standardization in the area of Artificial Intelligence
Artificial Intelligence
Standardization in the area of Artificial Intelligence
Asset Administration Shell for Industrial Applications – Part 2: Information meta model. 65/915/NP. 2022-07. 2022-07.
This document defines an information meta model for the Asset Administration Shell. This information meta model will enable the access of information describing an asset.
Asset Administration Shell for Industrial Applications – Part 3: Security provisions for Asset Administration Shells.
This part 3 of the IEC 63278 series aims at the secure and interoperable exchange of information between stakeholders in value chains.
Authenticated encryption
This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
Authenticated encryption
This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
Automatic identification and data capture techniques
SC 31 continues to deliver technically rigorous standards that meet user requirements. Looking ahead in 2016 SC31 will deliver three standards of note.
Automatic identification and data capture techniques
SC 31 continues to deliver technically rigorous standards that meet user requirements. Looking ahead in 2016 SC31 will deliver three standards of note.
Big data reference architecture - Part 2: Use cases and derived requirements
ISO/IEC TR 20547-2:2018 provides examples of big data use cases with application do
Big data reference architecture - Part 2: Use cases and derived requirements
ISO/IEC TR 20547-2:2018 provides examples of big data use cases with application do
Biometrics
Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.
Biometrics
Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.
Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following va
Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following va
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the worldwide cards industry.
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the worldwide cards industry.
Cards and security devices for personal identification -- Contactless proximity objects -- Part 1: Physical characteristics
ISO/IEC 14443-1:2018 defines the physical characteristics of proximity cards (PICCs).
ISO/IEC 14443-1:2018 is intended to be used in conjunction with other parts of ISO/IEC 14443.
Cards and security devices for personal identification -- Contactless proximity objects -- Part 1: Physical characteristics
ISO/IEC 14443-1:2018 defines the physical characteristics of proximity cards (PICCs).
ISO/IEC 14443-1:2018 is intended to be used in conjunction with other parts of ISO/IEC 14443.
Cards and security devices for personal identification -- Contactless vicinity objects -- Part 2: Air interface and initialization
This document specifies the nature and characteristics of the fields to be provided for power and bi-directional communications between vicinity coupling devices (VCDs) and vicinity cards (VICCs).
Cards and security devices for personal identification -- Contactless vicinity objects -- Part 2: Air interface and initialization
This document specifies the nature and characteristics of the fields to be provided for power and bi-directional communications between vicinity coupling devices (VCDs) and vicinity cards (VICCs).
Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those
Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those
Check character systems
This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data.
Check character systems
This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data.
Cloud computing -- Best practices for cloud SLA metrics
In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative obje
Cloud computing -- Best practices for cloud SLA metrics
In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative obje
Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.
Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.
Cloud Computing and Distributed Platforms
Standardization in the areas of Cloud Computing and Distributed Platforms including:
Cloud Computing and Distributed Platforms
Standardization in the areas of Cloud Computing and Distributed Platforms including:
Cloud computing – Cloud services and devices: data flow, data categories and data use — Part 1: Fundamentals
Cloud computing data flow, data categories and data use: Fundamentals
Cloud computing – Cloud services and devices: data flow, data categories and data use — Part 1: Fundamentals
Cloud computing data flow, data categories and data use: Fundamentals
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Cloud computing — Service level agreement (SLA) framework — Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Coded character sets
Scope of the SC : Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchang
Coded character sets
Scope of the SC : Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchang
Coded character sets
Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchange and code extensi
Coded character sets
Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchange and code extensi
Coding of audio, picture, multimedia and hypermedia information
Standardization of coded representation of audio, picture, multimedia and hypermedia information - and sets of compression and control functions for use with such information - such as:
Coding of audio, picture, multimedia and hypermedia information
Standardization of coded representation of audio, picture, multimedia and hypermedia information - and sets of compression and control functions for use with such information - such as:
Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evalu
Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evalu
Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 an
Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 an
Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations in accordance with ISO/IEC 15408 (all parts)&nbs
Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations in accordance with ISO/IEC 15408 (all parts)&nbs
Computer graphics, image processing and environmental data representation
The current area of work for JTC 1/SC 24 consists of:
Computer graphics, image processing and environmental data representation
The current area of work for JTC 1/SC 24 consists of:
Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 979
Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 979
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurity framework.
Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurity framework.
Data management and interchange
Standards for data management within and among local and distributed information systems environments.
Data management and interchange
Standards for data management within and among local and distributed information systems environments.
Digital Nameplate - Digital Product Marking
IEC 63365:2022 applies to products used in the process measurement, control and automation industry.
Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.
Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.
Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery.
Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery.
Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
Digitally Recorded Media for Information Interchange and Storage
Standardization in the field of removable digital storage media utilizing optical, holographic and magnetic recording technologies, and flash memory technologies for digital information interchange
Digitally Recorded Media for Information Interchange and Storage
Standardization in the field of removable digital storage media utilizing optical, holographic and magnetic recording technologies, and flash memory technologies for digital information interchange
Document description and processing languages
Standardization in the field of document structures, languages and related facilities for the description and processing of compound and hypermedia documents, including:
Document description and processing languages
Standardization in the field of document structures, languages and related facilities for the description and processing of compound and hypermedia documents, including:
Electromagnetic compatibility (EMC) - Part 6-2: Generic standards - Immunity standard for industrial environments (IEC 61000-6-2:2016)
This part of IEC 61000 for EMC immunity requirements applies to electrical and electronic equipment intended for use in industrial locations, as described below.
Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts of this International Standard.
Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts of this International Standard.
Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality.
Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality.
Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits.
Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits.
Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and
Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and
Encryption algorithms -- Part 5: Identity-based ciphers
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms.
Encryption algorithms -- Part 5: Identity-based ciphers
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms.
Encryption algorithms -- Part 6: Homomorphic encryption
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.
Encryption algorithms -- Part 6: Homomorphic encryption
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.
Energy efficiency through automation systems
IEC/TR 62837:2013(E) provides to the technical committees a framework for the development and adaptation of documents in order to improve energy efficiency in manufacturing, process control and ind
Engineering data exchange format for use in industrial automation systems engineering - Automation Markup Language - Part 1: Architecture and general requirements
IEC 62714-1:2018 is a solution for data exchange focusing on the domain of automation engineering.
Environmental testing - Part 2-1: Tests - Test A: Cold
IEC 60068-2-1:2007 Deals with cold tests applicable to both non heat-dissipating and heat-dissipating specimens.
Environmental testing - Part 2-27: Tests - Test Ea and guidance: Shock
Environmental testing - Part 2-27: Tests - Test Ea and guidance: Shock
Environmental testing - Part 2-2: Tests - Test B: Dry heat
IEC 60068-2-2:2007 Deals with dry heat tests applicable both to heat-dissipating and non heat-dissipating specimens.
Environmental testing - Part 2-64: Tests - Test Fh: Vibration, broadband random and guidance
IEC 60068-2-64:2008+A1:2019 demonstrates the adequacy of specimens to resist dynamic loads without unacceptable degradation of its functional and/or structural integrity when subjected to the specifie
Evaluation criteria for IT security -- Part 1: Introduction and general model
This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standa
Evaluation criteria for IT security -- Part 1: Introduction and general model
This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standa
Evaluation criteria for IT security -- Part 2: Security functional components
This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation.
Evaluation criteria for IT security -- Part 2: Security functional components
This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation.
Evaluation criteria for IT security -- Part 3: Security assurance components
This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408.
Evaluation criteria for IT security -- Part 3: Security assurance components
This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408.
Function blocks - Part 1: Architecture
IEC 61499-1:2012 defines a generic architecture and presents guidelines for the use of function blocks in distributed industrial-process measurement and control systems (IPMCSs).
Functional safety - Safety instrumented systems for the process industry sector - Part 1: Framework, definitions, system, hardware and application programming requirements
EC 61511-1:2016+A1:2017 gives requirements for the specification, design, installation, operation and maintenance of a safety instrumented system (SIS), so that it can be confidently entrusted to a
Functional safety of electrical/electronic/programmable electronic safety-related systems.
The standard covers safety-related systems that incorporate electrical/electronic /programmable electronic devices.The standard specifically covers hazards that occur when safety functions fail.
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII);
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
This document provides guidance for:
— selecting and specifying security functional requirements (SFRs) from ISO/IEC 15408-2 to protect Personally Identifiable Information (PII);
Guidance for the production of protection profiles and security targets
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all p
Guidance for the production of protection profiles and security targets
This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all p
Guidelines for cybersecurity
This International Standard provides guidance for improving the state of Cybersecurity.
It provides:
— an overview of Cybersecurity,
Guidelines for cybersecurity
This International Standard provides guidance for improving the state of Cybersecurity.
It provides:
— an overview of Cybersecurity,
Guidelines for the use and management of Trusted Third Party services
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers an
Guidelines for the use and management of Trusted Third Party services
Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers an
Identification cards -- ICC-managed devices -- Part 4: Test methods for logical characteristics
This document specifies the test methods used for conformity testing, to determine whether an ICC with at least one ICC-managed device is considered to conform with the specifications of ISO/IEC 18
Identification cards -- ICC-managed devices -- Part 4: Test methods for logical characteristics
This document specifies the test methods used for conformity testing, to determine whether an ICC with at least one ICC-managed device is considered to conform with the specifications of ISO/IEC 18
Identification cards -- Integrated circuit card programming interfaces -- Part 1: Architecture
ISO/IEC 24727 specifies a set of programming interfaces and protocols enabling interactions between integrated circuit cards (ICCs) and applications resident on a variety of computer platforms.
Identification cards -- Integrated circuit card programming interfaces -- Part 1: Architecture
ISO/IEC 24727 specifies a set of programming interfaces and protocols enabling interactions between integrated circuit cards (ICCs) and applications resident on a variety of computer platforms.
Identification cards -- Integrated circuit cards -- Part 3: Cards with contacts -- Electrical interface and transmission protocols
ISO/IEC 7816-3:2006 specifies the power and signal structures, and information exchange between an integrated circuit card and an interface device such as a terminal.
Identification cards -- Integrated circuit cards -- Part 3: Cards with contacts -- Electrical interface and transmission protocols
ISO/IEC 7816-3:2006 specifies the power and signal structures, and information exchange between an integrated circuit card and an interface device such as a terminal.
Identification cards -- Integrated circuit cards -- Part 9: Commands for card management
ISO/IEC 7816-9:2017 specifies interindustry commands for card, file and other structure management, i.e. data object and security object.
Identification cards -- Integrated circuit cards -- Part 9: Commands for card management
ISO/IEC 7816-9:2017 specifies interindustry commands for card, file and other structure management, i.e. data object and security object.
Identification cards -- Integrated circuit cards -- Privacy-enhancing protocols and services
ISO/IEC 19286:2018 aims to normalize privacy-enhancing protocols and services by
Identification cards -- Integrated circuit cards -- Privacy-enhancing protocols and services
ISO/IEC 19286:2018 aims to normalize privacy-enhancing protocols and services by
Identification Link - Part 1: General requirements
IEC 61406-1:2022 specifies minimum requirements for a globally unique identification of physical objects which also constitutes a link to its related digital information.
Identification Link - Part 2: Encoding of product types, lots, batches and characteristics
IEC 61406-2 complements IEC 61406-1 with specific rules for encoding characteristics of marked physical objects when relevant.
IEC 60050 - Details for IEV number 171-09-25: "robot"
robot. programmable device capable of carrying out a series of actions automatically. fr. robot, m. dispositif programmable capable d'effectuer une série ...
IEC 60050 - Details for IEV number 871-04-07: "assistive robot"
Area, Active assisted living (AAL) / Terms and definitions relating to devices and systems. IEV ref, 871-04-07. en. assistive robot. robot that assists an ...
IEC 61970-301:2020 Energy management system application program interface (EMS-API) - Part 301: Common information model (CIM) base
The Common Information Model (CIM) is an electric power transmission and distribution standard developed by the electric power industry.
IEC 61987-10:2009Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 10: List of Properties (LOPs) for Industrial-Process Measurement and Control for Electronic Data Exchange - Fundamentals
IEC 61987-10:2009 provides a method of standardizing the descriptions of process control devices, instrumentation and auxiliary equipment as well as their operating environments and operating requi
IEC 61987-11:2016Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 11: List of properties (LOPs) of measuring equipment for electronic data exchange - Generic structures
IEC 61987-11:2016 provides:<br /> - a characterisation of industrial process measuring equipment (device type dictionary) for integration in the Common Data Dictionary (CDD), and<br />
IEC 61987-12:2016Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 12: Lists of properties (LOPs) for flow measuring equipment for electronic data exchange
IEC 61987-12:2016 provides an operating list of properties (OLOP) for the description of the operating parameters and the collection of requirements for a flow measuring equipment and device lists
IEC 61987-13:2016Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 13: Lists of properties (LOP) for pressure measuring equipment for electronic data exchange
IEC 61987-13:2016 provides an operating list of properties (OLOP) for the description of the operating parameters and the collection of requirements for a pressure measuring equipment, and device l
IEC 61987-14:2016Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 14: Lists of properties (LOP) for temperature measuring equipment for electronic data exchange
IEC 61987-14:2016 provides an operating list of properties (OLOP) for the description of the operating parameters and the collection of requirements for temperature measuring equipment and device l
IEC 61987-15:2016Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 15: Lists of properties (LOPs) for level measuring equipment for electronic data exchange
IEC 61987-15:2016 provides operating list of properties (OLOP) for the description of the operating parameters and the collection of requirements for level measuring equipment, and device lists of
IEC 61987-16:2016Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 16: List of properties (LOPs) for density measuring equipment for electronic data exchange
IEC 61987-16:2016 provides an<br /> - operating list of properties (OLOP) for the description of the operating parameters and the collection of requirements for a density measuring equipment,
IEC 61987-1:2006Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 1: Measuring equipment with analogue and digital output
IEC 61987-1:2006 defines a generic structure in which product features of industrial-process measurement and control equipment with analogue or digital output should be arranged, in order to facili
IEC 61987-92:2018Industrial-process measurement and control - Data structures and elements in process equipment catalogues - Part 92: Lists of properties (LOP) of measuring equipment for electronic data exchange - Aspect LOPs
IEC 61987-92:2018 provides the lists of properties (LOPs) describing aspects of equipment for industrial-process automation that is subject to IEC 61987 standard series.<br /> This standard s
IEC 62325-451-10:2020 ED1
Framework for energy market communications - Part 451-10: Profiles for Energy Consumption Data (“My Energy Data”)
IEC 62325-451-10:2020 specifies a UML package for the Energy Consumption Data business process and its associated document contextual model, assembly model and XML schema for use within the Europea
IEC 62443-2-1:2010Industrial communication networks - Network and system security - Part 2-1: Establishing an industrial automation and control system security program
IEC 62443-2-1:2010 defines the elements necessary to establish a cyber security management system (CSMS) for industrial automation and control systems (IACS) and provides guidance on how to develop
IEC 62443-2-4:2015Security for industrial automation and control systems - Part 2-4: Security program requirements for IACS service providers
IEC 62443-2-4:2015 specifies requirements for security capabilities for IACS service providers that they can offer to the asset owner during integration and maintenance activities of an Automation
IEC 62443-3-2:2020Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
IEC 62443-3-2:2020 establishes requirements for: a) defining a system under consideration (SUC) for an industrial automation and control system (IACS); b) partitioning the SUC into zones and condui
IEC 62443-3-3:2013Industrial communication networks - Network and system security - Part 3-3: System security requirements and security levels
IEC 62443-3-3:2013 provides detailed technical control system requirements (SRs) associated with the seven foundational requirements (FRs) described in IEC 62443-1-1 including defining the requirem