Standard

Available (2726)

Showing 2149 - 2160 per page



IEEE 2600-2008 - C/CPSC - IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security, and information security) for manufacturers, users, and others on the selection, installation, configuration, and usage of hardcopy devices (HCDs) and systems, including printers, copiers, and multifunction devices (MFDs), and the computer systems that support these devices.

D-Cinema Operations — Auditorium Security Messages for Intra-Theater Communications

The Auditorium Security Message (ASM) specification enables interoperable communication of security-critical information (information necessary to ensure security of D-Cinema content) between devices over an intra-theater exhibition network.

SMPTE - ST 430-6:2010

Professional Media Over Managed IP Networks: System Timing and Definitions

This family of engineering documents defines an extensible system of RTP-based essence streams referenced to a common reference clock, in a manner which specifies their timing relationships. — This standard specifies the system timing model and the requirements common to of all of the essence streams.

SMPTE ST 2110-10:2017

ISO/IEC JTC 1/SC 27 27041:2015 - Guidance on assuring suitability and adequacy of incident investigative method

This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are “fit for purpose”. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27041:ed-1:v1:en

ISO/IEC JTC 1/SC 27 27038:2014 - Specification for digital redaction

Some documents can contain information that must not be disclosed to some communities. Modified documents can be released to these communities after an appropriate processing of the original document. This process is called the “redaction” of the document.
This International Standard specifies characteristics of techniques for performing digital redaction on digital documents. This International Standard also specifies requirements for software redaction tools and methods of testing that digital redaction has been securely completed.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:27038:ed-1:v1:en

ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General

ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions can be used for:

— reducing a message to a short imprint for input to a digital signature mechanism.

— committing the user to a given string of bits without revealing this string.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10118:-1:ed-3:v1:en

ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher

This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block cipher algorithm.
Four hash-functions are specified. The first provides hash-codes of length less than or equal to n, where n is the block-length of the underlying block cipher algorithm used. The second provides hash-codes of length less than or equal to 2n; the third provides hash-codes of length equal to 2n; and the fourth provides hash-codes of length 3n.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10118:-2:ed-3:v1:en

ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving rise to distinct dedicated hash-functions.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:10118:-3:ed-4:v1:en

ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework

In information technology there is an ever-increasing need to use cryptographic mechanisms for the protection of data against unauthorised disclosure or manipulation, for entity authentication, and for non-repudiation functions. The security and reliability of such mechanisms are directly dependent on the management and protection afforded to a security parameter, the key.
This part of ISO/IEC 11770:

a) establishes the general model on which key management mechanisms are based.

b) defines the basic concepts of key management which are common to all the parts of ISO/IEC 11770.

c) specifies the characteristics of key management services.

d) establishes general principles on the management of keying material during its life cycle.

e) establishes the conceptual model of key distribution.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-1:ed-2:v1:en

ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques

This document defines key establishment mechanisms using symmetric cryptographic techniques.
This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key Translation Centre (KTC).

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-2:ed-3:v1:en

ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques

This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.

a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement.

b) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B via key transport.

c) Make an entity's public key available to other entities via key transport.

Source: https://www.iso.org/obp/ui/#iso:std:iso-iec:11770:-3:ed-3:v1:en