ISO

Available (490)

Showing 409 - 420 per page



Supply chain applications of RFID - Product tagging

This document defines the basic features of RFID for use in the supply chain when applied to Product tagging, Product packaging, Transport units and Returnable transport items (RTIs) and Returnable packaging items (RPIs). This document: — provides specifications for the identification of the items, — makes recommendations about additional information on the RF tag, — specifies the semantics and data syntax to be used, — specifies the data protocol to be used to interface with business applications and the RFID system, — specifies the minimum performance requirements, — specifies the air interface standards between the RF interrogator and RF tag, and — specifies the reuse and recyclability of the RF tag.

ISO/IEC 17367

Information technology — Reference Architecture for Service Oriented Architecture (SOA RA) — Part 3: Service Oriented Architecture ontology

ISO/IEC 18384-3:2016 defines a formal ontology for service-oriented architecture (SOA), an architectural style that supports service orientation. The terms defined in this ontology are key terms from the vocabulary in ISO/IEC 18384-1.

ISO/IEC 18384-3:2016 [ISO/IEC 18384-3:2016]

Check character systems

This International Standard specifies a set of check character systems capable of protecting strings against errors which occur when people copy or type data. This International Standard specifies conformance requirements for products described as generating check characters or checking strings using the systems given in this International Standard.

ISO/IEC 7064:2003

Digital signature schemes giving message recovery -- Part 2: Integer factorization based mechanisms

This part of ISO/IEC 9796 specifies three digital signature schemes giving message recovery, two of which are deterministic (non-randomized) and one of which is randomized. The security of all three schemes is based on the difficulty of factorizing large numbers. All three schemes can provide either total or partial message recovery.

ISO/IEC 9796-2:2010

Digital signature schemes giving message recovery -- Part 3: Discrete logarithm based mechanisms

This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery. The security of these schemes is based on the difficulty of the discrete logarithm problem, which is defined on a finite field or an elliptic curve over a finite field.

ISO/IEC 9796-3:2006

Guidance for the production of protection profiles and security targets

This document provides guidance relating to the construction of Protection Profiles (PPs) and Security Targets (STs) that are intended to be compliant with the third edition of ISO/IEC 15408 (all parts). It is also applicable to PPs and STs compliant with Common Criteria Version 3.1 Revision 4[6], a technically identical standard published by the Common Criteria Management Board, a consortium of governmental organizations involved in IT security evaluation and certification.

ISO/IEC TR 15446:2017

Evaluation criteria for IT security -- Part 1: Introduction and general model

This part of ISO/IEC 15408 establishes the general concepts and principles of IT security evaluation and specifies the general model of evaluation given by various parts of the International Standard which in its entirety is meant to be used as the basis for evaluation of security properties of IT products.

ISO/IEC 15408-1:2009

Evaluation criteria for IT security -- Part 2: Security functional components

This part of ISO/IEC 15408 defines the required structure and content of security functional components for the purpose of security evaluation. It includes a catalogue of functional components that will meet the common security functionality requirements of many IT products.

ISO/IEC 15408-2:2008

Evaluation criteria for IT security -- Part 3: Security assurance components

This part of ISO/IEC 15408 defines the assurance requirements of ISO/IEC 15408. It includes the evaluation assurance levels (EALs) that define a scale for measuring assurance for component Targets of Evaluation (TOEs), the composed assurance packages (CAPs) that define a scale for measuring assurance for composed TOEs, the individual assurance components from which the assurance levels and packages are composed, and the criteria for evaluation of Protection Profiles (PPs) and Security Targets (STs).

ISO/IEC 15408-3:2008

Security assurance framework -- Part 1: Introduction and concepts

This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised set of concepts and their relationships for understanding IT security assurance, thereby establishing a basis for shared understanding of the concepts and principles central to ISO/IEC TR 15443 across its user communities. It provides information fundamental to users of ISO/IEC TR 15443-2.

ISO/IEC TR 15443-1:2012

Security assurance framework -- Part 2: Analysis

This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance claims and providing assurance evidence to fulfil meeting the assurance requirements for a deliverable.

ISO/IEC TR 15443-2:2012

Guidelines for the use and management of Trusted Third Party services

Associated with the provision and operation of a Trusted Third Party (TTP) are a number of security-related issues for which general guidance is necessary to assist business entities, developers and providers of systems and services, etc. This includes guidance on issues regarding the roles, positions and relationships of TTPs and the entities using TTP services, the generic security requirements, who should provide what type of security, what the possible security solutions are, and the operational use and management of TTP service security.

ISO/IEC TR 14516:2002