ISO

Available (493)

Showing 433 - 444 per page



Intelligent transport systems — Communications access for land mobiles (CALM) — Security considerations for lawful interception

ISO/TR 11766:2010 reviews the ITS landscape and the provisions of lawful interception to ITS deployments. In particular it considers the CALM environment and the services offered in the IPv6 domain served by CALM and ITS in general.

ISO/TR 11766:2010

Intelligent transport systems — Lane keeping assistance systems (LKAS) — Performance requirements and test procedures

ISO 11270:2014 contains the basic control strategy, minimum functionality requirements, basic driver interface elements, minimum requirements for diagnostics and reaction to failure, and performance test procedures for Lane Keeping Assistance Systems (LKAS). LKAS provide support for safe lane keeping operations by drivers and do not perform automatic driving nor prevent possible lane departures. The responsibility for the safe operation of the vehicle always remains with the driver. LKAS is intended to operate on highways and equivalent roads. LKAS consist of means for recognizing the location of the vehicle inside its lane and means for influencing lateral vehicle movement. LKAS should react consistently with the driver expectations with respect to the visible lane markings. The support at roadway sections having temporary or irregular lane markings (such as roadwork zones) is not within the scope of ISO 11270:2014. ISO 11270:2014 is applicable to passenger cars, commercial vehicles, and buses.

ISO 11270:2014

Intelligent transport systems — Use of nomadic and portable devices to support ITS service and multimedia provision in vehicles

ISO/TR 10992-2:2017 specifies the introduction of multimedia and telematics nomadic devices in the public transport and automotive world to support intelligent transport systems (ITS) service provisions and multimedia use such as passenger information, automotive information, driver advisory and warning systems, and entertainment system interfaces to ITS service providers and motor vehicle communication networks.

ISO/TR 10992-2:2017

Testing methods for the mitigation of non-invasive attack classes against cryptographic modules

This International Standard specifies the non-invasive attack mitigation test metrics for determining conformance to the requirements specified in ISO/IEC 19790 for Security Levels 3 and 4. The test metrics are associated with the security functions specified in ISO/IEC 19790. Testing will be conducted at the defined boundary of the cryptographic module and I/O available at its defined boundary.

ISO/IEC 17825:2016

Cryptographic techniques based on elliptic curves -- Part 1: General

This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, ISO/IEC 18033-2 and other ISO/IEC standards.

ISO/IEC 15946-1:2016

Competence requirements for information security testers and evaluators -- Part 1: Introduction, concepts and general requirements

This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby establishing a basis for shared understanding of the concepts and principles central to the ISO/IEC 19896 series across its user communities. It provides fundamental information to users of the ISO/IEC 19896 series.

ISO/IEC 19896-1:2018

Security assessment of operational systems

This Technical Report provides guidance and criteria for the security evaluation of operational systems. It provides an extension to the scope of ISO/IEC 15408, by taking into account a number of critical aspects of operational systems not addressed in ISO/IEC 15408 evaluation. The principal extensions that are required address evaluation of the operational environment surrounding the target of evaluation, and the decomposition of complex operational systems into security domains that can be separately evaluated.

ISO/IEC TR 19791:2010