Available Standards (996)
Showing standards 601 - 800
ISO 19650-1:2018 Organization and digitization of information about buildings and civil engineering works, including building information modelling (BIM): Information management using building information modelling: Part 1: Concepts and principles
This document outlines the concepts and principles for information management at a stage of maturity described as "building information modelling (BIM) according to the ISO 19650 series".
ISO 21127:2014: Information and documentation - A reference ontology for the interchange of cultural heritage information
ISO 21127:2014 establishes guidelines for the exchange of information between cultural heritage institutions.
ISO 24100:2010, 3.3. Intelligent transport systems - Basic principles for personal data protection in probe vehicle information services
ISO 24100:2010, 3.3. Intelligent transport systems::Basic principles for personal data protection in probe vehicle information services
ISO 24511:2007, 2.24.Activities relating to drinking water and wastewater services - Guidelines for the management of wastewater utilities and for the assessment of wastewater services
ISO 24511:2007, 2.24.Activities relating to drinking water and wastewater services::Guidelines for the management of wastewater utilities and for the assessment of wastewater services
ISO 24623-2:2021: Linguistic resource management - Corpus query lingua franca (CQLF) - Part 2: Ontology
This document specifies the structure of an ontology for a fine-grained description of the expressive power of corpus query languages (CQLs) in terms of search needs.
ISO 25237:2017, 3.42.Health informatics: Pseudonymization
ISO 25237:2017 contains principles and requirements for privacy protection using pseudonymization services for the protection of personal health information.
ISO 28902-2:2017, 3.1.Air quality: Environmental meteorology - Part 2: Ground-based remote sensing of wind by heterodyne pulsed Doppler lidar
ISO 28902-2:2017, 3.1.Air quality::Environmental meteorology::Part 2: Ground-based remote sensing of wind by heterodyne pulsed Doppler lidar
ISO 35106:2017, 3.9.Petroleum and natural gas industries: Arctic operations - Metocean, ice, and seabed data
ISO 35106:2017 specifies requirements and provides recommendations and guidance for the collection, analysis and presentation of relevant physical environmental data for activities of the petroleum
ISO 37101 Management system for sustainable development.
ISO 37101:2016 establishes requirements for a management system for sustainable development in communities, including cities, using a holistic approach, with a view to ensuring consistency with the
ISO 37120 - Sustainable Development and Resilience of Communities - Indicators for City Services and Quality of Life (under TC268)
ISO 37120 - Sustainable Development and Resilience of Communities - Indicators for City Services and Quality of Life (under TC268) http://ont
ISO 37120 Sustainable development of communities - Indicators for city development and operation
This document defines and establishes methodologies for a set of indicators to steer and measure the performance of city services and quality of life.
ISO 37152 Smart community infrastructures - Common framework for development and operation
ISO/TR 37152:2016 outlines the basic concept of a common framework for the development and operation of smart community infrastructures.
ISO 37153:2017, 3.9. Smart community infrastructures: Maturity model for assessment and improvement
ISO 37153:2017 provides the basis, requirements and guidance for a maturity model for the assessment of technical performance, process and interoperability of community infrastructure(s) as well as
ISO 6107:2021 Water quality - Vocabulary
The definitions in this edition of ISO 6107 are based on available standards and aim to harmonise the understanding of terms used within ISO TC147 Water quality to facilitate clear understanding an
ISO/DIS 20534 : 50.00 (2018) Industrial automation systems and integration - Formal semantic models for the configuration of global production networks
Defines a formal logic based concept specialisation approach to support the development of manufacturing reference models that can underpin the necessary business specific knowledge models that are
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS).
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS).
ISO/IEC - JTC 1/SC 38 DIS 22624 - Cloud Computing -- Taxonomy based data handling for cloud services
Status : Under development
ICS : 35.210 Cloud computing
ISO/IEC - JTC 1/SC 38 DIS 22624 - Cloud Computing -- Taxonomy based data handling for cloud services
Status : Under development
ICS : 35.210 Cloud computing
ISO/IEC - JTC 1/SC 41 - 20924:2018 - Internet of Things (IoT) -- Definition and vocabulary
This International Standard provides a definition of Internet of Things along with a set of terms and 5 definitions.
Still under development
ISO/IEC - JTC 1/SC 41 - 20924:2018 - Internet of Things (IoT) -- Definition and vocabulary
This International Standard provides a definition of Internet of Things along with a set of terms and 5 definitions.
Still under development
ISO/IEC - JTC 1/SC 41 - CD 21823-1 - Interoperability for internet of things systems -- Part 1: Framework
Interoperability for internet of things systems -- Part 1: Framework
Currently Under Development
ISO/IEC - JTC 1/SC 41 - CD 21823-1 - Interoperability for internet of things systems -- Part 1: Framework
Interoperability for internet of things systems -- Part 1: Framework
Currently Under Development
ISO/IEC - JTC 1/SC 41 30141:2018 - Internet of things and related technologies
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices.
ISO/IEC - JTC 1/SC 41 30141:2018 - Internet of things and related technologies
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices.
ISO/IEC - JTC 1/SC 42 - AWI TR 20547-1 - Big data reference architecture -- Part 1: Framework and application process
Information technology -- Big data reference architecture -- Part 1: Framework and application process
Currently Under Development
ISO/IEC - JTC 1/SC 42 - AWI TR 20547-1 - Big data reference architecture -- Part 1: Framework and application process
Information technology -- Big data reference architecture -- Part 1: Framework and application process
Currently Under Development
ISO/IEC 13250-5:2015 Information technology Topic Maps Part 5: Reference model
ISO/IEC 13250-5:2015 specifies a formal model for subject maps, minimal access functionality and information retrieval from subject maps and a constraint framework governing the interpretation of s
ISO/IEC 15944-4:2015 Information technology Business operational view Part 4: Business transaction scenarios Accounting and economic ontology
ISO/IEC 15944-4:2015 provides a set of UML class diagrams and conceptual explanations that circumscribe the Open-edi Business Transaction Ontology (OeBTO).
ISO/IEC 18384-3:2016 Information technology Reference Architecture for Service Oriented Architecture (SOA RA) Part 3: Service Oriented Architecture ontology
ISO/IEC 18384-3:2016 defines a formal ontology for service-oriented architecture (SOA), an architectural style that supports service orientation.
ISO/IEC 18384-3:2016 Information technology - Reference Architecture for Service Oriented Architecture (SOA RA) - Part 3: Service Oriented Architecture ontology
ISO/IEC 18384-3:2016 defines a formal ontology for service-oriented architecture (SOA), an architectural style that supports service orientation.
ISO/IEC 19763-3:2020 Information technology Metamodel framework for interoperability (MFI) Part 3: Metamodel for ontology registration
This document specifies the metamodel that provides a facility to register administrative and evolution information related to ontologies.
ISO/IEC 19763-3:2020 Information technology - Metamodel framework for interoperability (MFI) - Part 3: Metamodel for ontology registration
This document specifies the metamodel that provides a facility to register administrative and evolution information related to ontologies.
ISO/IEC 21000-19:2010 Information technology Multimedia framework (MPEG-21) Part 19: Media Value Chain Ontology
ISO/IEC 21000-19:2010 describes MPEG-21 Media Value Chain Ontology (MVCO).
ISO/IEC 21000-19:2010 Information technology - Multimedia framework (MPEG-21) - Part 19: Media Value Chain Ontology
ISO/IEC 21000-19:2010 describes MPEG-21 Media Value Chain Ontology (MVCO).
ISO/IEC 21000-21:2017 Information technology Multimedia framework (MPEG-21) Part 21: Media contract ontology
ISO/IEC 21000-21:2017 specifies an ontology for representing contracts in the Multimedia Framework formed for the transaction of MPEG-21 Digital Items or services related to the MPEG-21 Framework.
ISO/IEC 21000-21:2017 Information technology - Multimedia framework (MPEG-21) - Part 21: Media contract ontology
ISO/IEC 21000-21:2017 specifies an ontology for representing contracts in the Multimedia Framework formed for the transaction of MPEG-21 Digital Items or services related to the MPEG-21 Framework.
ISO/IEC 21823-3:2021 Internet of things (IoT) - Interoperability for IoT systems - Part 3: Semantic interoperability
This document provides the basic concepts for IoT systems semantic interoperability, as described in the facet model of ISO/IEC 21823-1, including: - requirements of the core ontologies for semanti
ISO/IEC 21838-2:2021 Information technology Top-level ontologies (TLO) Part 2: Basic Formal Ontology (BFO)
This document describes Basic Formal Ontology (BFO), which is an ontology that is conformant to the requirements specified for top-level ontologies inISO/IEC218381.
ISO/IEC 21972:2020 Information technology Upper level ontology for smart city indicators
This document establishes general principles and gives guidelines for an indicator upper level ontology (IULO) for smart cities that enables the representation of indicator definitions and the data
ISO/IEC 21972:2020 Information technology-Upper level ontology for smart city indicatorsβ concepts (e.g., indicator, population, cardinality); andβ properties that relate concepts (e.g., cardinality_of, parameter_of_var).
This document establishes general principles and gives guidelines for an indicator upper level ontology (IULO) for smart cities that enables the representation of indicator definitions and the data
ISO/IEC 30145-1 Smart City ICT Reference Framework - Business Process Framework
This document specifies a generic business process framework for a smart city focusing solely on smart city-specific processes.
ISO/IEC 30145-2 - Smart City ICT Reference Framework -Knowledge Management Framework
This document specifies a generic knowledge management framework for a smart city, focusing on creating, capturing, sharing, using and managing smart city knowledge.
ISO/IEC 30145-3:2020 - Information technology - Smart City ICT reference framework - Part 3: Smart city engineering framework
This document describes a framework, structured in layers of ICT technologies, essential for smart cities' operation.
ISO/IEC 30146:2019 - Information technology - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities.
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block
ISO/IEC DIS 21838-3 Information technology - Top-level ontologies (TLO) - Part 3: Descriptive ontology for linguistic and cognitive engineering (DOLCE)
The Descriptive Ontology for Linguistic and Cognitive Engineering (DOLCE) is a top-level ontology (TLO) conforming to ISO/IEC 21838-1.
ISO/IEC DIS 21838-4 Information technology - Top-level ontologies (TLO) - Part 4: TUpper
PSL is being incorporated into the TUpper ontology as Part 4 of ISO 21838 (Top Level Ontologies).
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function.
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function.
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions can be used for:
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions can be used for:
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function.
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function.
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e.
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e.
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographi
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographi
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more βderivedβ secret keys.
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more βderivedβ secret keys.
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available and verify eviΒdence concerning a claimed event or action in order to reΒsolve disΒputes about the occurrence
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available and verify eviΒdence concerning a claimed event or action in order to reΒsolve disΒputes about the occurrence
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security standards and information security management practic
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security standards and information security management practic
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling digital evidence, which are identification,
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling digital evidence, which are identification,
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common incident investigation processes across va
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common incident investigation processes across va
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques.
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques.
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms.
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms.
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage).
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage).
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities.
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities.
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation o
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation o
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC.
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC.
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques:
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques:
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices.
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices.
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as:
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as:
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities.
ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities.
ISO/PAS 19450:2015Automation systems and integration - Object-Process Methodology
ISO/PAS 19450:2015 specifies Object-Process Methodology (OPM) with detail sufficient for enabling practitioners to utilise the concepts, semantics, and syntax of Object-Process Methodology as a mod
ISO/TR 14292:2012, 2.11.Health informatics: Personal health records - Definition, scope and contexts
This Technical Report also considers the wider context of engagement of individuals in the management of their own health and healthcare, since this engagement is the primary driver for present-day
ISO/TR 17427-9:2015, 2.5. Intelligent transport systems: Cooperative ITS - Part 9: Compliance and enforcement aspects
ISO/TR 17427-9:2015, 2.5.Intelligent transport systems::Cooperative ITS::Part 9: Compliance and enforcement aspects
ISO/TR 18307:2001, 3.51. Health informatics: Interoperability and compatibility in messaging and communication standards - Key characteristics
ISO/TR 18307:2001, 3.51. Health informatics::Interoperability and compatibility in messaging and communication standards::Key characteristics