Available Standards (996)
Showing standards 1 - 200
ISO/IEC - JTC 1/SC 27 - 27005:2018
This document provides guidelines for information security risk management in an organization. However, this document does not provide any specific method for information security risk management.
ISO/IEC - JTC 1/SC 27 - 27005:2018
This document provides guidelines for information security risk management in an organization. However, this document does not provide any specific method for information security risk management.
3-D human body scan data - Part 1: Terminologies and methodologies for processing of human scan data
This standard specifies terms, methods, and considerations related to the processing of scan data using software after acquiring human body scan data using a 3-D human body scanner.
Additive manufacturing β Test artifacts β Geometric capability assessment of additive manufacturing systems
This document covers the general description of benchmarking test piece geometries along with quantitative and qualitative measurements to be taken on the benchmarking test piece(s) to assess the perf
Addressing - Part 1: Conceptual model
This document is the first of a family of standards.
Advanced automation technologies and their applications β Requirements for establishing manufacturing enterprise process interoperability β Part 1: Framework for enterprise interoperability
The purpose of ISO 11354-1:2011 is to specify a Framework for Enterprise Interoperability (FEI) that establishes dimensions and viewpoints to address interoperability barriers, their potential solutio
Advanced automation technologies and their applications β Requirements for establishing manufacturing enterprise process interoperability β Part 2: Maturity model for assessing enterprise interoperability
ISO 11354-2:2015 specifies:- levels to represent the capability of an enterprise to interoperate with other enterprises.
Application of blockchain-based traceability platform for cold chain food
This document defines Application of blockchain-based traceability platform for cold chain food.
Application of ubiquitous public access to-geographic information to an air quality information service
This document facilitates an understanding of the Ubiquitous Public Access (UPA) context information model, as defined in ISO 19154, to establish a UPA-to-Geographic Information (GI) environment.
Artificial Intelligence
Standardization in the area of Artificial Intelligence
Artificial Intelligence
Standardization in the area of Artificial Intelligence
Authenticated encryption
This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
Authenticated encryption
This International Standard specifies six methods for authenticated encryption, i.e. defined ways of processing a data string with the following security objectives:
Automatic identification and data capture techniques
SC 31 continues to deliver technically rigorous standards that meet user requirements. Looking ahead in 2016 SC31 will deliver three standards of note.
Automatic identification and data capture techniques
SC 31 continues to deliver technically rigorous standards that meet user requirements. Looking ahead in 2016 SC31 will deliver three standards of note.
Automation systems and integration - Digital twin framework for manufacturing - Part 4: Information exchange
This document identifies technical requirements for information exchange between entities within the reference architecture.
Automation systems and integration - Evaluating energy efficiency and other factors of manufacturing systems that influence the environment - Part 1: Overview and general principles
This document provides the overview and general principles of a method for evaluating environmental performance, including energy efficiency and other factors, of a manufacturing system that influe
Automation systems and integration - Evaluating energy efficiency and other factors of manufacturing systems that influence the environment - Part 2: Environmental performance evaluation process
This document specifies a process for environmental performance evaluation of activities executed by a manufacturing system based on the general principles described in ISO 20140β1.
Automation systems and integration - Evaluating energy efficiency and other factors of manufacturing systems that influence the environment - Part 3: Environmental performance evaluation data aggregation process
This document specifies an aggregation process that provides aggregated environmental performance evaluation data in accordance with a given environmental performance evaluation specification confo
Automation systems and integration - Evaluating energy efficiency and other factors of manufacturing systems that influence the environment - Part 5: Environmental performance evaluation data
ISO 20140-5:2017 specifies the types of environmental performance evaluation (EPE) data, including their attributes, which can be used for evaluating the environmental performance of manufacturing
Automation systems and integration - Industrial data - Visualization elements of digital twins
This document analyses visualization elements that are key components of the interface between the physical asset and the avatar (digital replica of the physical asset).
Automation systems and integration β Digital twin framework for manufacturing β Part 1: Overview and general principles
This document provides an overview and general principles of a digital twin framework for manufacturing including:
β terms and definitions;
Automation systems and integration β Digital twin framework for manufacturing β Part 2: Reference architecture
This document provides a reference architecture for the digital twin in manufacturing including;
β reference model from domain and entity point of view;
Automation systems and integration β Digital twin framework for manufacturing β Part 3: Digital representation of manufacturing elements
This document provides a list of basic information attributes for the OMEs:
β examples of information attributes are given;
Automation systems and integration β Digital twin framework for manufacturing β Part 4: Information exchange
This document identifies technical requirements for information exchange between entities within the reference architecture.
Automation systems and integration β Evaluating energy efficiency and other factors of manufacturing systems that influence the environment β Part 5: Environmental performance evaluation data
ISO 20140-5:2017 specifies the types of environmental performance evaluation (EPE) data, including their attributes, which can be used for evaluating the environmental performance of manufacturing
Automation systems and integration β Object-Process Methodology
ISO/PAS 19450:2015 specifies Object-Process Methodology (OPM) with detail sufficient for enabling practitioners to utilise the concepts, sema
Automation systems and integration β Quality information framework (QIF) β An integrated model for manufacturing quality information
This document describes the general content and structure of the entire QIF information model.
Big data reference architecture - Part 2: Use cases and derived requirements
ISO/IEC TR 20547-2:2018 provides examples of big data use cases with application do
Big data reference architecture - Part 2: Use cases and derived requirements
ISO/IEC TR 20547-2:2018 provides examples of big data use cases with application do
Biometrics
Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.
Biometrics
Standardization of generic biometric technologies pertaining to human beings to support interoperability and data interchange among applications and systems.
Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following va
Blind digital signatures -- Part 1: General
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following va
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures.
Blockchain and distributed ledger technologies
Overview of identity management using blockchain and distributed ledger technologies
Blockchain and distributed ledger technologies
Discovery issues related to interoperability
Blockchain and distributed ledger technologies
Security management of digital asset custodians
Blockchain and distributed ledger technologies
Overview of and interactions between smart contracts in blockchain and distributed ledger technology systems
Blockchain and distributed ledger technologies - Identifiers of subjects and objects for the design of blockchain systems
This documents define Identifiers of subjects and objects for the design of blockchain systems via Blockchain and distributed ledger technologies.
Blockchain and distributed ledger technologies - Overview of existing DLT systems for identity management
This document provides an overview of existing DLT systems for identity management, i.e.
Blockchain and distributed ledger technologies - Privacy and personally identifiable information protection considerations
This document provides an overview of privacy and personally identifiable information (PII) protection as applied to blockchain and distributed ledger technologies (DLT) systems.
Blockchain and distributed ledger technologies -- Legally binding smart contracts
Blockchain and distributed ledger technologies -- Legally binding smart contracts
Blockchain and distributed ledger technologies -- Privacy and personally identifiable information protection considerations
35.030 IT Security
35.240.99 IT applications in other fields
35.240.40 IT applications in banking
Blockchain and distributed ledger technologies -- Reference architecture
35.030 IT Security
35.240.40 IT applications in banking
35.240.99 IT applications in other fields
Blockchain and distributed ledger technologies -- Security risks, threats and vulnerabilities
35.030 IT Security
35.240.40 IT applications in banking
35.240.99 IT applications in other fields
Blockchain and distributed ledger technologies -- Taxonomy and Ontology
Standardisation of blockchain technologies and distributed ledger technologies.
Blockchain and distributed ledger technologies -- Terminology
35.030 IT Security
35.240.40 IT applications in banking
01.040.35 Information technology (Vocabularies)
35.240.99 IT applications in other fields
Building information models - Information delivery manual - Part 1: Methodology and format
This part of ISO 29481 specifies:
Building information modelsΒ - Information delivery manualΒ - PartΒ 2: Interaction framework
ISO 29481-2:2012 specifies a methodology and format for describing coordination between actors in a building construction project during all life cycle stages.
Business requirements for endβtoβend visibility of logistics flow
This document specifies three business requirements for the visibility of logistics traffic flow based on the use cases and gap analysis in Annex A. It includes
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the worldwide cards industry.
Cards and security devices for personal identification
SC 17 continues to deliver card standards that are ubiquitous in their use by the worldwide cards industry.
Cards and security devices for personal identification -- Contactless proximity objects -- Part 1: Physical characteristics
ISO/IEC 14443-1:2018 defines the physical characteristics of proximity cards (PICCs).
ISO/IEC 14443-1:2018 is intended to be used in conjunction with other parts of ISO/IEC 14443.
Cards and security devices for personal identification -- Contactless proximity objects -- Part 1: Physical characteristics
ISO/IEC 14443-1:2018 defines the physical characteristics of proximity cards (PICCs).
ISO/IEC 14443-1:2018 is intended to be used in conjunction with other parts of ISO/IEC 14443.
Cards and security devices for personal identification -- Contactless vicinity objects -- Part 2: Air interface and initialization
This document specifies the nature and characteristics of the fields to be provided for power and bi-directional communications between vicinity coupling devices (VCDs) and vicinity cards (VICCs).
Cards and security devices for personal identification -- Contactless vicinity objects -- Part 2: Air interface and initialization
This document specifies the nature and characteristics of the fields to be provided for power and bi-directional communications between vicinity coupling devices (VCDs) and vicinity cards (VICCs).
Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those
Catalogue of architectural and design principles for secure products, systems and applications
This document provides a catalogue of architectural and design principles that can be used in the development of secure products, systems and applications together with guidance on how to use those
Check character systems
This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data.
Check character systems
This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data.
Circular Economy β Product Circularity Data Sheet
The document provides a general methodology for improving the accuracy and completeness of circular economy related information based on the usage of a Product Circularity Data Sheet when acquiring
Clothing - Digital fittings - Part 1: Vocabulary and terminology used for the virtual human body
This document is the first of a family of standards.
Clothing - Digital fittings - Part 2: Vocabulary and terminology used for attributes of the virtual human body
ISO 18825-2:2016 defines the terms used to describe the virtual human body which is used in virtual garment systems. Specifically, virtual body landmarks and virtual body dimensions are described.
Clothing - Digital fittings - Vocabulary and terminology used for the virtual garment
ISO 18133:2016 defines the terms that are commonly used for the digital fitting system.
Cloud computing -- Best practices for cloud SLA metrics
In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative obje
Cloud computing -- Best practices for cloud SLA metrics
In most cases, cloud service providers (CSPs) and cloud service customers (CSCs) negotiate service level agreements (SLAs) which include service level objectives (SLOs) and service qualitative obje
Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Cloud computing -- Service level agreement (SLA) framework -- Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.
Cloud computing -- Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.
Cloud Computing and Distributed Platforms
Standardization in the areas of Cloud Computing and Distributed Platforms including:
Cloud Computing and Distributed Platforms
Standardization in the areas of Cloud Computing and Distributed Platforms including:
Cloud computing β Cloud services and devices: data flow, data categories and data use β Part 1: Fundamentals
Cloud computing data flow, data categories and data use: Fundamentals
Cloud computing β Cloud services and devices: data flow, data categories and data use β Part 1: Fundamentals
Cloud computing data flow, data categories and data use: Fundamentals
Cloud computing β Service level agreement (SLA) framework β Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Cloud computing β Service level agreement (SLA) framework β Part 2: Metric model
This document establishes common terminology, defines a model for specifying metrics for cloud SLAs, and includes applications of the model with examples.
Coded character sets
Scope of the SC : Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchang
Coded character sets
Scope of the SC : Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchang
Coded character sets
Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchange and code extensi
Coded character sets
Standardization of graphic character sets and their characteristics, including string ordering, associated control functions, their coded representation for information interchange and code extensi
Coding of audio, picture, multimedia and hypermedia information
Standardization of coded representation of audio, picture, multimedia and hypermedia information - and sets of compression and control functions for use with such information - such as:
Coding of audio, picture, multimedia and hypermedia information
Standardization of coded representation of audio, picture, multimedia and hypermedia information - and sets of compression and control functions for use with such information - such as:
Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evalu
Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements
This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evalu
Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 an
Competence requirements for information security testers and evaluators -- Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers
This document provides the minimum requirements for the knowledge, skills and effectiveness requirements of individuals performing testing activities for a conformance scheme using ISO/IEC 19790 an
Competence requirements for information security testers and evaluators β Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations in accordance with ISO/IEC 15408 (all parts)&nbs
Competence requirements for information security testers and evaluators β Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators.
This document provides the specialized requirements to demonstrate competence of individuals in performing IT product security evaluations in accordance with ISO/IEC 15408 (all parts)&nbs
Computer graphics, image processing and environmental data representation
The current area of work for JTC 1/SC 24 consists of:
Computer graphics, image processing and environmental data representation
The current area of work for JTC 1/SC 24 consists of:
Condition monitoring and diagnostics of machines β Prognostics β Part 1: General guidelines
ISO 13381-1:2015 provides guidance for the development and application of prognosis processes. It is intended to
Confirmation procedures for the application of artefact metrics
This document specifies a process to qualify the suitability, reliability and effectiveness of artefact metrics as well as artefact metric recognition principles for identification and verification
Consumer protection - Privacy by design for consumer goods and services - Part 1: High-level requirements
This document establishes high-level requirements for privacy by design to protect privacy throughout the lifecycle of a consumer product, including data processed by the consumer.
Core banking β Mobile financial services β Part 1: General framework
ISO 12812-1:2017 defines the general framework of mobile financial services (payment and banking services involving a mobile device), with a focus on:
Core banking β Mobile financial services β Part 2: Security and data protection for mobile financial services
ISO 12812-2:2017 describes and specifies a framework for the management of the security of MFS. It includes
- a generic model for the design of the security policy,
Core banking β Mobile financial services β Part 3: Financial application lifecycle management
ISO/TS 12812-3:2017 specifies the interoperable lifecycle management of applications used in mobile financial services.
Core banking β Mobile financial services β Part 4: Mobile payments-to-persons
ISO/TS 12812-4:2017 provides comprehensive requirements and recommendations, as well as specific use cases for implementation of interoperable mobile payments-to-persons.
Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Cryptographic algorithms and security mechanisms conformance testing
This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods.
Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 979
Cryptographic techniques based on elliptic curves -- Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 979
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
Cryptographic techniques based on elliptic curves -- Part 5: Elliptic curve generation
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurity framework.
Cybersecurity and ISO and IEC Standards
This document provides guidance on how to leverage existing standards in a cybersecurity framework.
Data management and interchange
Standards for data management within and among local and distributed information systems environments.
Data management and interchange
Standards for data management within and among local and distributed information systems environments.
Data quality
ISO 8000 is the global standard for Data Quality and Enterprise Master Data. It describes the features and defines the requirements for standard exchange of Master Data among business partners.
Data quality - Part 1: Overview
This document is the first of a family of standards. This document provides an overview of the ISO 8000 series. The following are within the scope of this document:
Data quality - Part 210: Sensor data: Data quality characteristics
This deliverable specifies quality characteristics of data that is recorded by sensors as a stream of single, discrete digital values by sensors.
Data quality - Part 220: Sensor data: Quality measurement
This deliverable specifies quality measures for quantitatively measuring quality characteristics of sensor data, where these characteristics are specified by ISO 8000-210.
Data structures for electronic product catalogues for building services - Part 2: Geometry
ISO 16757-2:2016 describes the modelling of building services product geometry. The description is optimized for the interchange of product catalogue data and includes
Decentralized Identity standard for the identification of subjects and objects
A standard for the design and use of decentralized and self-sovereign identification of subjects (legal entities and natural persons) and objects, assets within the design of Blockchain and DLT Sys
Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.
Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized.
Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery.
Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery.
Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
Digital signatures with appendix -- Part 1: General
ISO/IEC 14888 specifies several digital signature mechanisms with appendix for messages of arbitrary length.
Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
Digital signatures with appendix -- Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies:
Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
Digital Twin - Correspondence measure of DTw twinning
Definition of DTw correspondence measure; Components of the measure such as similarity, resolution, latency, LoD (level of detail); Quantification of the measure, Relation with other DTw projects incl
Digital Twin - Extraction and transactions of data components
This document specifies technical aspects related to the extraction, decoupling, trading, and benefits of data components throughout the digital twin life cycle.
Digitally Recorded Media for Information Interchange and Storage
Standardization in the field of removable digital storage media utilizing optical, holographic and magnetic recording technologies, and flash memory technologies for digital information interchange
Digitally Recorded Media for Information Interchange and Storage
Standardization in the field of removable digital storage media utilizing optical, holographic and magnetic recording technologies, and flash memory technologies for digital information interchange
Document description and processing languages
Standardization in the field of document structures, languages and related facilities for the description and processing of compound and hypermedia documents, including:
Document description and processing languages
Standardization in the field of document structures, languages and related facilities for the description and processing of compound and hypermedia documents, including:
Document management - 3D use of Product Representation Compact (PRC) format - Part 1: PRC 10001
ISO 14739-1:2014 describes PRC 10001 of a product representation compact (PRC) file format for three dimensional (3D) content data.
Document management - Portable document format - Part 1: PDF 1.7
ISO 32000-1:2008 specifies a digital form for representing electronic documents to enable users to exchange and view electronic documents independent of the environment in which they were created or t
Document management - Portable document format - Part 2: PDF 2.0
This document specifies a digital form for representing electronic documents to enable users to exchange and view electronic documents independent of the environment in which they were created or the
Document management - Portable document format - RichMedia annotations conforming to the ISO 10303-242 (STEP AP 242) specification
This document specifies how to extend the ISO 32000-2 specification by adding the ISO 10303-242 (STEP AP 242) format as a valid format for 3D assets contained in a RichMedia annotation.
Document management - XML Forms Data Format - Part 1: Use of ISO 32000-2 (XFDF 3.0)
This document specifies an XML format for representing forms data and annotations in the Portable Document Format, ISO 32000-2 (PDF 2.0).
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4) - Part 1: Syntax rules common to all parts
This part of ISO 9735 specifies common syntax rules for the formatting of batch and interactive messages to be interchanged between computer application systems.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 2: Syntax rules specific to batch EDI
This part of ISO 9735 specifies syntax rules specifically for the formatting of batch messages to be interchanged between computer application systems.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 3: Syntax rules specific to interactive EDI
This part of ISO 9735 specifies syntax rules specifically for the transfer of interactive messages to be interchanged between computer application systems.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 4: Syntax and service report message for batch EDI (message type - CONTRL)
This part of ISO 9735 defines the syntax and service report message for batch EDI, CONTRL.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 5: Security rules for batch EDI
This part of ISO 9735 specifies syntax rules for EDIFACT security.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 6: Secure authentication and acknowledgement message (Message type: AUTACK)
This part of ISO 9735 for EDIFACT security defines the secure authentication and acknowledgement message AUTACK.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 7: Security rules for batch EDI (confidentiality)
This part of ISO 9735 for batch EDIFACT security addresses message/package level, group level and interchange level security for confidentiality in accordance with established security mechanisms.<
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 8: Associated data in EDI
This part of ISO 9735 specifies syntax rules for associated data in EDI to be interchanged between computer application systems.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 1) - Part 9: Security key and certificate management message (message type: KEYMAN)
This part of ISO 9735 for batch EDIFACT security defines the security key and certificate management message KEYMAN.
Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 2) - Part 10: Syntax service directories
ISO 9735-10:2014 specifies the syntax service directories of all parts of ISO 9735.
Electronic data interchange for administration, commerce and transport (EDIFACT)Β - Application level syntax rules
Scope of part 1: This part of ISO 9735 specifies common syntax rules for the formatting of batch and interactive messages to be interchanged between computer application systems.
Electronic fee collection β Compliance check communication for autonomous systems
This document defines requirements for short-range communication for the purposes of compliance checking in autonomous electronic fee collecting systems.
Electronic fee collection β Evaluation of on-board and roadside equipment for conformity to ISO 12813
ISO 13143-2:2016 specifies the abstract test suite (ATS) to evaluate the conformity of on-board equipment (OBE) and roadside equipment (RSE) to ISO 12813 in accordance with the test suite structure
Electronic fee collection β Evaluation of on-board and roadside equipment for conformity to ISO 12813
ISO 18143-1:2016 specifies the test suite structure (TSS) and test purposes (TP) to evaluate the conformity of on-board units (OBU) and roadside equipment (RSE) to ISO 12813:2015.
Electronic fee collection β Evaluation of on-board and roadside equipment for conformity to ISO 13141
ISO 13140-2:2016 specifies the abstract test suite (ATS) to evaluate the conformity of on-board equipment (OBE) and roadside equipment (RSE) to ISO 13141:2015 in accordance with the test suite stru
Electronic fee collection β Evaluation of on-board and roadside equipment for conformity to ISO 13141
ISO 13140-1:2016 specifies the test suite structure (TSS) and test purposes (TP) to evaluate the conformity of on-board units (OBU) and roadside equipment (RSE) to ISO 13141.
Electronic fee collection β Localisation augmentation communication for autonomous systems
ISO 13141:2015 establishes requirements for short-range communication for the purposes of augmenting the localization in autonomous electronic fee collection (EFC) systems.
Electronic Storage Specifications for use of Visible Digital Seal (VDS) for the authentication, verification and acquisition of data carried by a document or object
This document specifies the Visible Digital Seal (VDS) data structure.
Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts of this International Standard.
Encryption algorithms -- Part 1: General
This part of ISO/IEC 18033 is general in nature, and provides definitions that apply in subsequent parts of this International Standard.
Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality.
Encryption algorithms -- Part 2: Asymmetric ciphers
ISO/IEC 18033-2:2006 specifies encryption systems (ciphers) for the purpose of data confidentiality.
Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits.
Encryption algorithms -- Part 3: Block ciphers
This part of ISO/IEC 18033 specifies block ciphers. A block cipher maps blocks of n bits to blocks of n bits, under the control of a key of k bits.
Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and
Encryption algorithms -- Part 4: Stream ciphers
This part of ISO/IEC 18033 specifies
a) output functions to combine a keystream with plaintext,
b) keystream generators for producing keystream, and