Available Standards (627)
Showing standards 401 - 600
Information technology β Security techniques β Extension to ISO/IEC 27001 and to ISO/IEC 27002 for privacy information management β Requirements and guidelines
Although there is substantial overlap between information security and privacy management, both fields are broader.
Information technology β Security techniques β Extension to ISO/IEC 27001 and to ISO/IEC 27002 for privacy information management β Requirements and guidelines
Although there is substantial overlap between information security and privacy management, both fields are broader.
Information technology β Security techniques β Privacy architecture framework
This document defines a privacy architecture framework that:
β specifies concerns for ICT systems that process PII;
β lists components for the implementation of such systems; and
Information technology β Security techniques β Privacy architecture framework
This document defines a privacy architecture framework that:
β specifies concerns for ICT systems that process PII;
β lists components for the implementation of such systems; and
Information technology β Security techniques β Privacy engineering for system life cycle processes
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:
Information technology β Security techniques β Privacy engineering for system life cycle processes
This document provides privacy engineering guidelines that are intended to help organizations integrate recent advances in privacy engineering into system life cycle processes. It describes:
Information technology β Security techniques β Privacy framework
ISO/IEC 29100:2011 provides a privacy framework which
Information technology β Security techniques β Privacy framework
ISO/IEC 29100:2011 provides a privacy framework which
Information technology β Security techniques β Vulnerability handling processes
ISO/IEC 30111 gives guidelines for how to process and resolve potential vulnerability information in a product or online service.
Information technology β Security techniques β Vulnerability handling processes
ISO/IEC 30111 gives guidelines for how to process and resolve potential vulnerability information in a product or online service.
Information technology β Sensor network testing framework
ISO/IEC 19637:2016 specifies:
- testing framework for conformance test for heterogeneous sensor networks,
Information technology β Sensor network testing framework
ISO/IEC 19637:2016 specifies:
- testing framework for conformance test for heterogeneous sensor networks,
Information technology β Sensor networks β Generic Sensor Network Application Interface
ISO/IEC 30128:2014 specifies the interfaces between the application layers of service providers and sensor network gateways, which is Protocol A in interface 3, defined in ISO/IEC 29182β5.
Information technology β Sensor networks β Generic Sensor Network Application Interface
ISO/IEC 30128:2014 specifies the interfaces between the application layers of service providers and sensor network gateways, which is Protocol A in interface 3, defined in ISO/IEC 29182β5.
Information technology β Sensor networks β Services and interfaces supporting collaborative information processing in intelligent sensor networks
ISO/IEC 20005:2013 specifies services and interfaces supporting collaborative information processing (CIP) in intelligent sensor networks which includes:
Information technology β Sensor networks β Services and interfaces supporting collaborative information processing in intelligent sensor networks
ISO/IEC 20005:2013 specifies services and interfaces supporting collaborative information processing (CIP) in intelligent sensor networks which includes:
Information technology β Sensor networks β Use cases of aeronautics industry: Active Air-flow Control
ISO/IEC TR 22560:2017(E) This Technical Report describes the concepts, issues, objectives, and requirements for the design of an active air-flow control (AFC) system for commercial aircraft based o
Information technology β Sensor networks β Use cases of aeronautics industry: Active Air-flow Control
ISO/IEC TR 22560:2017(E) This Technical Report describes the concepts, issues, objectives, and requirements for the design of an active air-flow control (AFC) system for commercial aircraft based o
Information technology β Sensor networks: Sensor network and its interfaces for smart grid system
ISO/IEC 30101:2014 is for sensor networks in order to support smart grid technologies for power generation, distribution, networks, energy storage, load efficiency, control and communications, and
Information technology β Sensor networks: Sensor network and its interfaces for smart grid system
ISO/IEC 30101:2014 is for sensor networks in order to support smart grid technologies for power generation, distribution, networks, energy storage, load efficiency, control and communications, and
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 1: General overview and requirements
ISO/IEC 29182-1:2013 provides a general overview of the characteristics of a sensor network and the organization of the entities that comprise such a network.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 1: General overview and requirements
ISO/IEC 29182-1:2013 provides a general overview of the characteristics of a sensor network and the organization of the entities that comprise such a network.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 2: Vocabulary and terminology
ISO/IEC 29182-2:2013 is intended to facilitate the development of International Standards in sensor networks.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 2: Vocabulary and terminology
ISO/IEC 29182-2:2013 is intended to facilitate the development of International Standards in sensor networks.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 3: Reference architecture views
ISO/IEC 29182-3:2014 provides Sensor Network Reference Architecture (SNRA) views.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 3: Reference architecture views
ISO/IEC 29182-3:2014 provides Sensor Network Reference Architecture (SNRA) views.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 4: Entity models
The purpose of the ISO/IEC 29182 series is to
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 4: Entity models
The purpose of the ISO/IEC 29182 series is to
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 5: Interface definitions
ISO/IEC 29182-5:2013 provides the definitions and requirements of sensor network (SN) interfaces of the entities in the Sensor Network Reference Architecture and covers the following aspects:
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 5: Interface definitions
ISO/IEC 29182-5:2013 provides the definitions and requirements of sensor network (SN) interfaces of the entities in the Sensor Network Reference Architecture and covers the following aspects:
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 6: Applications
ISO/IEC 29182-6:2014, describes and provides
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 6: Applications
ISO/IEC 29182-6:2014, describes and provides
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 7: Interoperability guidelines
ISO/IEC 29182-7:2015 provides a general overview and guidelines for achieving interoperability between sensor network services and related entities in a heterogeneous sensor network.
Information technology β Sensor networks: Sensor Network Reference Architecture (SNRA) β Part 7: Interoperability guidelines
ISO/IEC 29182-7:2015 provides a general overview and guidelines for achieving interoperability between sensor network services and related entities in a heterogeneous sensor network.
Information technology β Underwater acoustic sensor network (UWASN) β Part 1: Overview and requirements
ISO/IEC 30140-1:2018(E) This part of ISO/IEC 30140 provides a general overview of underwater acoustic sensor networks (UWASN).
Information technology β Underwater acoustic sensor network (UWASN) β Part 1: Overview and requirements
ISO/IEC 30140-1:2018(E) This part of ISO/IEC 30140 provides a general overview of underwater acoustic sensor networks (UWASN).
Information technology β Underwater acoustic sensor network (UWASN) β Part 2: Reference architecture
ISO/IEC 30140-2:20017(E) This part of ISO/IEC 30140 provides an underwater acoustic sensor network (UWASN) conceptual model by identifying and defining three domains (application domain, network do
Information technology β Underwater acoustic sensor network (UWASN) β Part 2: Reference architecture
ISO/IEC 30140-2:20017(E) This part of ISO/IEC 30140 provides an underwater acoustic sensor network (UWASN) conceptual model by identifying and defining three domains (application domain, network do
Information technology β Underwater acoustic sensor network (UWASN) β Part 3: Entities and interface
ISO/IEC 30140-3:2018 The 30140 series provides general requirements, reference architecture and high-level interface guidelines supporting interoperability among underwater acoustic sensor networks
Information technology β Underwater acoustic sensor network (UWASN) β Part 3: Entities and interface
ISO/IEC 30140-3:2018 The 30140 series provides general requirements, reference architecture and high-level interface guidelines supporting interoperability among underwater acoustic sensor networks
Information technology β Underwater acoustic sensor network (UWASN) β Part 4: Interoperability
ISO/IEC 30140-4:2018 The ISO/IEC 30140 series provides general requirements, reference architecture and high-level interface guidelines supporting interoperability among underwater acoustic sensor
Information technology β Underwater acoustic sensor network (UWASN) β Part 4: Interoperability
ISO/IEC 30140-4:2018 The ISO/IEC 30140 series provides general requirements, reference architecture and high-level interface guidelines supporting interoperability among underwater acoustic sensor
Insulation coordination for equipment within low-voltage supply systems - Part 1: Principles, requirements and tests
IEC 60664-1:2020 deals with insulation coordination for equipment having a rated voltage up to AC 1 000 V or DC 1 500 V connected to low-voltage supply systems.
Integrated circuit cards -- Enhanced terminal accessibility using cardholder preference interface
ISO/IEC 12905:2011 specifies a set of data elements to be personalized into an integrated circuit card, encoding cardholder preferences.
Integrated circuit cards -- Enhanced terminal accessibility using cardholder preference interface
ISO/IEC 12905:2011 specifies a set of data elements to be personalized into an integrated circuit card, encoding cardholder preferences.
Interconnection of information technology equipment
Standardization of microprocessor systems; and of interfaces, protocols, architectures and associated interconnecting media for information technology equipment and networks, generally for commerci
Interconnection of information technology equipment
Standardization of microprocessor systems; and of interfaces, protocols, architectures and associated interconnecting media for information technology equipment and networks, generally for commerci
Internet of Things (IoT) - Interoperability for IoT Systems - Part 3: Semantic interoperability
Standardization in the area of Internet of Things and related technologies.
Internet of Things (IoT) - Interoperability for IoT Systems - Part 3: Semantic interoperability
Standardization in the area of Internet of Things and related technologies.
Internet of Things (loT) β Reference Architecture
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices.
Internet of Things (loT) β Reference Architecture
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices.
Internet of things and related technologies
Standardization in the area of Internet of Things and related technologies.
Internet of things and related technologies
Standardization in the area of Internet of Things and related technologies.
Interoperability for IoT Systems - Part 2: Transport interoperability
Standardization in the area of Internet of Things and related technologies.
Interoperability for IoT Systems - Part 2: Transport interoperability
Standardization in the area of Internet of Things and related technologies.
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS).
ISO/IEC JTC 1/SC 27/WG1 27000:2018 - Information security management systems - Overview and vocabulary
This document provides the overview of information security management systems (ISMS).
ISO/IEC - JTC 1/SC 38 DIS 22624 - Cloud Computing -- Taxonomy based data handling for cloud services
Status : Under development
ICS : 35.210 Cloud computing
ISO/IEC - JTC 1/SC 38 DIS 22624 - Cloud Computing -- Taxonomy based data handling for cloud services
Status : Under development
ICS : 35.210 Cloud computing
ISO/IEC - JTC 1/SC 41 - 20924:2018 - Internet of Things (IoT) -- Definition and vocabulary
This International Standard provides a definition of Internet of Things along with a set of terms and 5 definitions.
Still under development
ISO/IEC - JTC 1/SC 41 - 20924:2018 - Internet of Things (IoT) -- Definition and vocabulary
This International Standard provides a definition of Internet of Things along with a set of terms and 5 definitions.
Still under development
ISO/IEC - JTC 1/SC 41 - CD 21823-1 - Interoperability for internet of things systems -- Part 1: Framework
Interoperability for internet of things systems -- Part 1: Framework
Currently Under Development
ISO/IEC - JTC 1/SC 41 - CD 21823-1 - Interoperability for internet of things systems -- Part 1: Framework
Interoperability for internet of things systems -- Part 1: Framework
Currently Under Development
ISO/IEC - JTC 1/SC 41 30141:2018 - Internet of things and related technologies
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices.
ISO/IEC - JTC 1/SC 41 30141:2018 - Internet of things and related technologies
This document provides a standardized IoT Reference Architecture using a common vocabulary, reusable designs and industry best practices.
ISO/IEC - JTC 1/SC 42 - AWI TR 20547-1 - Big data reference architecture -- Part 1: Framework and application process
Information technology -- Big data reference architecture -- Part 1: Framework and application process
Currently Under Development
ISO/IEC - JTC 1/SC 42 - AWI TR 20547-1 - Big data reference architecture -- Part 1: Framework and application process
Information technology -- Big data reference architecture -- Part 1: Framework and application process
Currently Under Development
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block
ISO/IEC 9797-3:2011 Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
This part of ISO/IEC 9797 specifies the following MAC algorithms that use a secret key and a universal hash-function with an n-bit result to calculate an m-bit MAC based on the block
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function.
ISO/IEC JTC 1/SC 27 9798-4:1999 Entity authentication - Part 4: Mechanisms using a cryptographic check function
This part of ISO/IEC 9798 specifies entity authentication mechanisms using a cryptographic check function.
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions can be used for:
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions can be used for:
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function.
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function.
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techniques.
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e.
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e.
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographi
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographi
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more βderivedβ secret keys.
ISO/IEC JTC 1/SC 27 11770-6:2016 - Key management - Part 6: Key derivation
This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more βderivedβ secret keys.
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available and verify eviΒdence concerning a claimed event or action in order to reΒsolve disΒputes about the occurrence
ISO/IEC JTC 1/SC 27 13888-1:2009 - Non-repudiation - Part 1: General
The goal of a non-repudiation service is to generate, collect, maintain, make available and verify eviΒdence concerning a claimed event or action in order to reΒsolve disΒputes about the occurrence
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security standards and information security management practic
ISO/IEC JTC 1/SC 27 27002:2013 - Code of practice for information security controls
This International Standard gives guidelines for organizational information security standards and information security management practic
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling digital evidence, which are identification,
ISO/IEC JTC 1/SC 27 27037:2012 Guidelines for identification, collection, acquisition and preservation of digital evidence
This International Standard provides guidelines for specific activities in handling digital evidence, which are identification,
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to
ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence
This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common incident investigation processes across va
ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes
This International Standard provides guidelines based on idealized models for common incident investigation processes across va
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques.
ISO/IEC JTC 1/SC 27 9798-1:2010 Entity authentication - Part 1: General
This part of ISO/IEC 9798 specifies an authentication model and general requirements and constraints for entity authentication mechanisms which use security techniques.
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms.
ISO/IEC JTC 1/SC 27 9798-2:2008 Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
This part of ISO/IEC 9798 specifies entity authentication mechanisms using symmetric encipherment algorithms.
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage).
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage).
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities.
ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction
Some documents can contain information that must not be disclosed to some communities.
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation o
ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation o
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC.
ISO/IEC JTC 1/SC 27 9797-2:2011 Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
This part of ISO/IEC 9797 specifies three MAC algorithms that use a secret key and a hash-function (or its round-function) with an n-bit result to calculate an m-bit MAC.
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques:
ISO/IEC JTC 1/SC 27 9798-5:2009 - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques
This part of ISO/IEC 9798 specifies entity authentication mechanisms using zero-knowledge techniques:
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices.
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on manual data transfer between authenticating devices.
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as:
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
The development of standards for the protection of information and ICT. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as:
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
ISO/IEC JTC 1/SC27 9798-3:2019 Entity authentication Part 3: Mechanisms using digital signature techniques
This document specifies entity authentication mechanisms using digital signatures based on asymmetric techniques. A digital signature is used to verify the identity of an entity.
ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities.
ISO/IEC JTC 1/WG11 DIS 30146 - Smart city ICT indicators
This document defines a comprehensive set of evaluation indicators specially related to information and communication technologies (ICT) adoption and usage in smart cities.
IT Service Management and IT Governance
Scope
Standardization of IT Service Management and IT Governance.
IT Service Management and IT Governance
Scope
Standardization of IT Service Management and IT Governance.
Low-voltage switchgear and controlgear - Product data and properties for information exchange - Part 1: Catalogue data
This document establishes the reference dictionary of the general description of low-voltage switchgear and controlgear classes based on defined properties.
Material declaration - Part 1: General requirements
This document specifies the requirements and guidance for the content, format and exchange relating to material declarations for products and accessories of organizations operating in and supplying
Medical electrical equipment - Part 2-77: Particular requirements for the basic safety and essential performance of robotically assisted surgical equipment
IEC 80601-2-77:2019 applies to the BASIC SAFETY and ESSENTIAL PERFORMANCE of ROBOTICALLY ASSISTED SURGICAL EQUIPMENT (RASE) and ROBOTICALLY ASSISTED SURGICAL SYSTEMS (RASS), referred to as ME EQUIPMEN
Medical electrical equipment - Part 2-78: Particular requirements for basic safety and essential performance of medical robots for rehabilitation, assessment, compensation or alleviation
EC 80601-2-78:2019 applies to the general requirements for BASIC SAFETY and ESSENTIAL PERFORMANCE of MEDICAL ROBOTS that physically interact with a PATIENT with an IMPAIRMENT to support or perform REH
Methodology for IT security evaluation
This International Standard is a companion document to the evaluation criteria for IT security defined in ISO/IEC 15408.
Methodology for IT security evaluation
This International Standard is a companion document to the evaluation criteria for IT security defined in ISO/IEC 15408.
Office equipment
Standardization of basic characteristics, test methods and other related items of products such as 2D and 3D Printers/Scanners, Copiers, Projectors, Fax and Systems composed of their combinations,
Office equipment
Standardization of basic characteristics, test methods and other related items of products such as 2D and 3D Printers/Scanners, Copiers, Projectors, Fax and Systems composed of their combinations,
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
IEC 62351-9:2017 specifies cryptographic key management, namely how to generate, distribute, revoke, and handle public-key certificates and cryptographic keys to
Prime number generation
This International Standard specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.
Prime number generation
This International Standard specifies methods for generating and testing prime numbers as required in cryptographic protocols and algorithms.
Programming languages, their environments and system software interfaces
JTC 1/SC 22 is the international standardization subcommittee for programming languages, their environments and system software interfaces.
Programming languages, their environments and system software interfaces
JTC 1/SC 22 is the international standardization subcommittee for programming languages, their environments and system software interfaces.
Quantification and communication of Carbon FootPRINT and GHG emission reductions/avoided emissions from electric and electronic products and systems β Principles, methodologies, requirements and guidance
This document of IEC 63372 describes principles and methodologies, specifies requirements and provides guidance on quantification and communication of Carbon footprint (sum of GHG emissions and rem
Random bit generation
This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.
This International Standard
Random bit generation
This International Standard specifies a conceptual model for a random bit generator for cryptographic purposes, together with the elements of this model.
This International Standard
Safety of machinery - Security aspects related to functional safety of safety-related control systems
IEC TR 63074:2019 gives guidance on the use of IEC 62443 (all parts) related to those aspects of security threats and vulnerabilities that could influence functional safety implemented and realized by
Secret sharing -- Part 1: General
ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties.
Secret sharing -- Part 1: General
ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties.
Secret sharing -- Part 2: Fundamental mechanisms
This document specifies cryptographic secret sharing schemes.
Secret sharing -- Part 2: Fundamental mechanisms
This document specifies cryptographic secret sharing schemes.
Security assessment of operational systems
This Technical Report provides guidance and criteria for the security evaluation of operational systems.
Security assessment of operational systems
This Technical Report provides guidance and criteria for the security evaluation of operational systems.
Security assurance framework -- Part 1: Introduction and concepts
This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis
Security assurance framework -- Part 1: Introduction and concepts
This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis
Security assurance framework -- Part 2: Analysis
This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1.
Security assurance framework -- Part 2: Analysis
This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1.
Security evaluation of biometrics
This International Standard specifies the subjects to be addressed during a security evaluation of a biometric system.
Security evaluation of biometrics
This International Standard specifies the subjects to be addressed during a security evaluation of a biometric system.
Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
IEC 62443-3-2:2020 establishes requirements for:β’ defining a system under consideration (SUC) for an industrial automation and control system (IACS). β’ partitioning the SUC into zones and conduits.
Security for industrial automation and control systems - Part 4-1: Secure product development lifecycle requirements (IEC 62443-4-1:2018); German version EN IEC 62443-4-1:2018
Specifies process requirements for the secure development of products used in industry automation and control systems.
Security information objects for access control
The scope of this Recommendation | International Standard is:
Security information objects for access control
The scope of this Recommendation | International Standard is:
Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems.
Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within a security system protecting sensitive information in computer and telecommunication systems.
Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.
Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information components, SLOs and SQOs for cloud service level agreements (cloud SLA) including requirements and guidance.
Smart Cities
1. Serve as the focus of and proponent for JTC 1's Smart Cities standardization program.
Smart Cities
1. Serve as the focus of and proponent for JTC 1's Smart Cities standardization program.
Smart city concept model β Guidance for establishing a model for data interoperability.
This International Standard is aimed at organizations that provide services to communities in cities, and manage the resulting data, as well as decision-makers and policy developers in cities
Smart city concept model β Guidance for establishing a model for data interoperability.
This International Standard is aimed at organizations that provide services to communities in cities, and manage the resulting data, as well as decision-makers and policy developers in cities
Software and systems engineering
Software is now ubiquitous and an extremely important element in almost any technology and technology based systems.
Software and systems engineering
Software is now ubiquitous and an extremely important element in almost any technology and technology based systems.
Specification of TTP services to support the application of digital signatures
This Recommendation | International Standard will define those TTP services needed to support the application of digital signatures for the purpose of non-repudiation of creation of documents.
Specification of TTP services to support the application of digital signatures
This Recommendation | International Standard will define those TTP services needed to support the application of digital signatures for the purpose of non-repudiation of creation of documents.
Standard data element types with associated classification scheme - Part 1: Definitions - Principles and methods
This part of IEC 61360 specifies principles for the definition of the properties and associated
attributes and explains the methods for representing verbally defined concepts with
Standard data element types with associated classification scheme for electric components - Part 2: EXPRESS dictionary schema
This part of IEC 61360 series provides a formal model for data according to the scope as
given in IEC 61360-1 and ISO 13584-42, and thus provides a means for the computer-
Sustainability, IT & Data Centres
Standardization of assessment methods, design practices, operation and management aspects to support resource efficiency, resilience and environmental sustainability for and by information , data c
Sustainability, IT & Data Centres
Standardization of assessment methods, design practices, operation and management aspects to support resource efficiency, resilience and environmental sustainability for and by information , data c
Technical requirements and application of sensor network for wireless gas meters
ISO/IEC TR 30148:2019 describes
β the structure of wireless gas meter networks, and
β the application protocol of wireless gas meter networks.
Technical requirements and application of sensor network for wireless gas meters
ISO/IEC TR 30148:2019 describes
β the structure of wireless gas meter networks, and
β the application protocol of wireless gas meter networks.
Telebiometric authentication framework using biometric hardware security module
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.
Telebiometric authentication framework using biometric hardware security module
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a telecommunication administration and a recognized operating agency.
Telecommunications and information exchange between systems
Since SC6 was established in 1964, SC6 has worked on standardization in the field of telecommunications dealing with the exchange of information between open systems, including system functions, pr
Telecommunications and information exchange between systems
Since SC6 was established in 1964, SC6 has worked on standardization in the field of telecommunications dealing with the exchange of information between open systems, including system functions, pr
Test methods for machine readable travel documents (MRTD) and associated devices
This document provides a set of instructions for evaluation of MRPs which may incorporate contactless integrated circuits.