Standard

Available (2726)

Showing 2137 - 2148 per page



Cloud Application Management for Platforms Version 1.2 (CAMP 1.2)

This document defines the artifacts and APIs that need to be offered by a Platform as a Service (PaaS) cloud to manage the building, running, administration, monitoring and patching of applications in the cloud. Its purpose is to enable interoperability among self-service interfaces to PaaS clouds by defining artifacts and formats that can be used with any conforming cloud and enable independent vendors to create tools and services that interact with any conforming cloud using the defined interfaces. Cloud vendors can use these interfaces to develop new PaaS offerings that will interact with independently developed tools and components.

 

ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10116:ed-4:v1:en

ISO/IEC JTC 1/SC 27 27042:2015 - Guidelines for the analysis and interpretation of digital evidence

This International Standard provides guidance on the conduct of the analysis and interpretation of potential digital evidence in order to identify and evaluate digital evidence which can be used to aid understanding of an incident. The exact nature of the data and information making up the potential digital evidence will depend on the nature of the incident and the digital evidence sources involved in that incident.

This International Standard provides guidance on the analysis and interpretation of digital evidence in a manner which addresses issues of continuity, validity, reproducibility, and repeatability.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27042:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27043:2015 - Incident investigation principles and processes

This International Standard provides guidelines based on idealized models for common incident investigation processes across various incident investigation scenarios involving digital evidence. This includes processes from pre-incident preparation through investigation closure, as well as any general advice and caveats on such processes.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27043:ed-1:v1:en

IEEE 1619.1-2007 - C/CPSC - IEEE Standard for Authenticated Encryption with Length Expansion for Storage Devices

This standard specifies cryptographic and data authentication procedures for storage devices that support length-expansion, such as tape drives. Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.

IEEE 1667-2006 - C/CPSC - IEEE Standard Protocol for Authentication in Host Attachments of Transient Storage Devices

Cryptographic and data authentication procedures for storage devices that support length expansion, such as tape drives, are specified.
Such procedures include the following cryptographic modes of operation for the AES block cipher: CCM, GCM, CBC-HMAC, and XTS-HMAC.

IEEE 1686-2007 - PE/PSCC - IEEE Standard for Substation Intelligent Electronic Devices (IEDs) Cyber Security Capabilities

In this standards are defined the functions and features to be provided in substation intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs.
This standards also addresses the security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.

IEEE 1686-2013 - PE/PSCC - IEEE Standard for Intelligent Electronic Devices Cyber Security Capabilities

In this standards are defined the functions and features to be provided in intelligent electronic devices (IEDs) to accommodate critical infrastructure protection programs.
This standards also addresses the security regarding the access, operation, configuration, firmware revision, and data retrieval from an IED.