Standard
Available Standards (316)
Showing standards 201 - 316
Standard
ITU-T K.46 (05/2012) - Protection of telecommunication lines using metallic symmetric conductors against lightning-induced surges
Tue, May 29 2012Standard
ITU-T K.81 (06/2016) - High-power electromagnetic immunity guide for telecommunication systems
Wed, Jun 29 2016Standard
ITU-T K.85 (11/2011) - Requirements for the mitigation of lightning effects on home networks installed in customer premises
Sun, Nov 13 2011Standard
ITU-T K.87 (06/2016) - Guide for the application of electromagnetic security requirements - Overview
Wed, Jun 29 2016Standard
Standard
Standard
ITU-T X.1082 (11/2007) - Telebiometrics related to human physiology
Tue, Nov 13 2007Standard
ITU-T X.1525 (04/2015) - Common weakness scoring system
Fri, Apr 17 2015Standard
ITU-T X.1570 (09/2011) - Discovery mechanisms in the exchange of cybersecurity information
Fri, Sep 2 2011Standard
ITU-T X.1710
Recommendation ITU-T X.1710 specifies a framework including requirements and measures t... Thu, Jan 9 2020 (Fri, Jan 10 2020)Standard
ITU-T X.1714
Recommendation ITU-T X.1714 describes key combination methods for quantum key distribut... Thu, Jan 9 2020 (Fri, Jan 10 2020)Standard
ITU-T X.810 (11/1995) - Information technology - Open Systems Interconnection - Security frameworks for open systems: Overview
Tue, Nov 21 1995Standard
Standard
ITU-T Y.2701 (04/2007) - Security requirements for NGN release 1
Fri, Apr 27 2007Standard
Key Management Interoperability Protocol ProfilesVersion 2.0
This standard specifies conformance clauses in accordance with the OASIS TC Process ([T...Standard
KMIP Additional Message Encodings v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Asymmetric Key Lifecycle Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Cryptographic Services Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Opaque Managed Object Store Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Suite B Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Symmetric Key Foundry for FIPS 140-2 Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Symmetric Key Lifecycle Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Standard
KMIP Tape Library Profile v1.0
The OASIS KMIP TC works to define a single, comprehensive protocol for communication be... Fri, May 1 2015Working group
Management systems and controls sets
The WG considers national and international standards for adoption in the domain of man...Standard
Methodology for IT security evaluation
This International Standard is a companion document to the evaluation criteria for IT s... Fri, Aug 1 2008Mobile Application Security Testing
The Mobile Application Security Testing (MAST) initiative aims to create a safer cloud ...Working group
OASIS Cross-Enterprise Security and Privacy Authorization (XSPA) TC
The OASIS XSPA TC works to standardize the way healthcare providers, hospitals, pharmac...Working group
OASIS Security Services (SAML) TC
The Security Assertion Markup Language (SAML), developed by the Security Services Techn...Standard
Ontology of Identity Credentials
An ontology of identity credentials is an explicit specification of a conceptualization... Sun, Oct 1 2006Standard
Open Smart Grid Protocol (OSGP); Smart Metering/Smart Grid Communication Protocol
The objective of this scope of work is to provide an update of an existing section of E... Thu, Dec 22 2016Standard
Permissions
The Permissions Standard defines common infrastructure for other specifications that ne... Mon, Sep 25 2017Standard
PKCS #11 Cryptographic Token Interface Base Specification Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
PKCS #11 Cryptographic Token Interface Current Mechanisms Specification Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
PKCS #11 Cryptographic Token Interface Historical Mechanisms Specification Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
PKCS #11 Cryptographic Token Interface Profiles Version 2.40
The OASIS PKCS 11 Technical Committee develops enhancements to improve the PKCS #11 sta... Sun, Mar 1 2015Standard
Power systems management and associated information exchange - Data and communications security - Part 9: Cyber security key management for power system equipment
IEC 62351-9:2017 specifies cryptographic key management, namely how to generate, distri... Thu, May 18 2017Standard
Prime number generation
This International Standard specifies methods for generating and testing prime numbers ... Sat, Jan 1 2005Standard
Privacy enhancing data de-identification terminology and classification of techniques
This document provides a description of privacy-enhancing data de-identification techni... Thu, Nov 1 2018Standard
Privacy protection - Privacy guidelines for smart cities
The document takes a multiple agency as well as a citizen-centric viewpoint. It provide... Fri, Jan 1 2021Standard
Privacy technologies - Consent record information structure
This document specifies an interoperable, open and extensible information structure for... Tue, Aug 1 2023Standard
Proof-of-concept for data service using information centric networking in IMT-2020
This Supplement specifies a proof-of-concept for a service that provides named data suc... Fri, Jul 27 2018Working group
Quantum-safe Security
The CSA Quantum Safe Security Working Group's goal is to address key generation and tra...Standard
Random bit generation
This International Standard specifies a conceptual model for a random bit generator for... Tue, Nov 1 2011Standard
Rationalized structure for electronic signature standardization - Best practices for SMEs
This Technical Report aims to be the entry point in relation to electronic signatures f... Tue, May 1 2018Standard
Rationalized structure for electronic signature standardization - Guidelines for citizens
This Technical Report aims to help citizens to understand the relevance of using electr... Tue, May 1 2018Standard
Recommended Practices for Virtual Classroom Security, Privacy and Data Governance
This recommended practice produces best practices for meeting the requirements of IEEE ...Standard
Referrer Policy
This document describes how an author can set a referrer policy for documents they crea... Thu, Jan 26 2017Standard
Relationship with ISO 12100 — Part 4: Guidance to machinery manufacturers for consideration of related IT-security (cyber security) aspects.
This document gives machine manufacturers guidance on potential security aspects in rel... Sat, Dec 1 2018Standard
Standard
Road vehicles — Cybersecurity engineering
This document specifies engineering requirements for cybersecurity risk management rega... Tue, Aug 31 2021Standard
Road vehicles — Functional safety — Part 1: Vocabulary
This document is intended to be applied to safety-related systems that include one or m... Mon, Dec 31 2018Standard
Secret sharing -- Part 1: General
ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their prop... Tue, Nov 1 2016Security as a Service
The purpose of this research will be to identify consensus definitions of what Security...Standard
Security Assertion Markup Language (SAML 2.0)
SAML is an XML-based framework for exchanging security information. This security infor... Fri, Jun 30 2006Standard
Security Assertion Markup Language (SAML) v2.0
The Security Assertion Markup Language (SAML), developed by the Security Services Techn... Sun, Mar 1 2015Standard
Security assessment of operational systems
This Technical Report provides guidance and criteria for the security evaluation of ope... Thu, Apr 1 2010Standard
Security assurance framework -- Part 1: Introduction and concepts
This part of ISO/IEC TR 15443 defines terms and establishes an extensive and organised ... Thu, Nov 1 2012Standard
Security assurance framework -- Part 2: Analysis
This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. I... Thu, Nov 1 2012Standard
Security considerations for quantum key distribution networks
This Technical Report provides security considerations for quantum key distribution (QK... Thu, Jan 2 2020 (Fri, Jan 3 2020)Working group
Security evaluation and assessment
Security evaluation and assessmentStandard
Security evaluation of biometrics
This International Standard specifies the subjects to be addressed during a security ev... Sat, Aug 1 2009Standard
Security framework and requirements for service function chaining based on software-defined networking
Recommendation ITU-T X.1043 analyses security threats to and defines security requireme... Sat, Mar 16 2019Standard
Security Guidance
Cloud Security Alliance’s Security Guidance for Critical Areas of Focus in Cloud Comput...Security guidelines for identity management systems
This Recommendation proposes security guidelines for identity management (IdM) systems.... Fri, Sep 2 2011Standard
Security information objects for access control
The scope of this Recommendation | International Standard is: a) the definition of guid... Fri, Feb 1 2002Standard
Security management systems for the supply chain - Guidelines for the implementation of ISO 28000 - Part 2: Guidelines for adopting ISO 28000 for use in medium and small seaport operations
This part of ISO 28004 identifies supply chain risk and threat scenarios, procedures fo... Sat, Feb 1 2014Standard
Security reference architecture for lifecycle management of e-commerce business data
Recommendation ITU-T X.1040 analyses the main features and typical threats faced by e‑c... Sat, Oct 14 2017Standard
Security requirements and framework for narrowband Internet of things
Recommendation ITU-T X.1364 analyses potential deployment schemes and typical applicati... Thu, Mar 26 2020Standard
Security requirements for cryptographic modules
ISO/IEC 19790:2012 the security requirements for a cryptographic module utilised within... Wed, Aug 1 2012Standard
Security requirements for software as a service application environments
Recommendation ITU-T X.1602 analyses the maturity levels of software as a service (SaaS... Wed, Mar 23 2016Standard
Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines
This document specifies requirements and provides guidance for establishing, implementi... Fri, Aug 30 2019Standard
Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
This document specifies security and protection of personally identifiable information ... Tue, Jan 1 2019Standard
Smart city concept model — Guidance for establishing a model for data interoperability.
This International Standard is aimed at organizations that provide services to communit... Mon, May 1 2017Standard
Specification of TTP services to support the application of digital signatures
This Recommendation | International Standard will define those TTP services needed to s... Fri, Feb 1 2002Working group
Standard for Authentication in a Multi-server Environment
The standard describes an authentication scheme including the following features: 1) Us...Standard
Standard for Big Data Business Security Risk Assessment
This standard can be applied to internet-based business scenarios, and can also be serv... Mon, Feb 1 2021Standard
Standard for Biometric Liveness Detection
A biometric lifeless attack is one of the indispensable issues within biometric authent... Fri, Apr 24 2020Working group
Standard for Confirming and Conveying Identity Over the Internet
The standard defines methods of out-of-band third-party individual identity attestation...Standard
Standard for Fail-Safe Design of Autonomous and Semi-Autonomous Systems
This standard establishes a practical, technical baseline of specific methodologies and...Standard
Standard for Human Augmentation: Identity
This standard specifies the requirements and methods for verifying the identity of a pe... Thu, Mar 5 2020Standard
Standard for Machine Readable Personal Privacy Terms
The standard identifies/addresses the manner in which personal privacy terms are proffe...Standard
STIX(TM) Version 2.0
The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of informati... Sat, Jul 1 2017Standard
Study of Authorization Architecture for Supporting Heterogeneous Access Control Policies
The present document provides technical solutions for oneM2M authorization architecture... Thu, Sep 1 2016Standard
Supplement on overall aspects of countering mobile messaging spam
Supplement 12 to ITU-T X-series Recommendations, in particular to Recommendation ITU-T ... Fri, Mar 2 2012Working group
Supplementary grip devices
Preparation of European Standards specifying safety and performance requirements for su...Standard
TAXII(TM) Version 2.0
The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of informati... Sun, May 1 2016Technical Committee (TC) Core Network and Interoperability Testing (INT)
We develop test specifications to test interoperability, conformance, performance and s...Technical Committee (TC) Human Factors (HF)
We deal with issues relating to the ease of use and accessibility for all users. Our wo...Working group
Technical Committee (TC) Methods for Testing and Specification (MTS)
We create standards related to testing and specification languages and provide framewor...Standard
Standard
Technical security measures for implementation of ITU-T X.805 security dimensions
Many organizations in developing countries as well as developed countries may have diff... Fri, Oct 14 2016Standard
Telebiometric authentication framework using biometric hardware security module
In this Recommendation, the expression "Administration" is used for conciseness to indi... Fri, Sep 1 2017Standard
Telebiometric authentication using biosignals
Biometric technology in mobile devices is frequently used in various areas that require... Sat, Mar 16 2019Standard
Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
This International Standard specifies the non-invasive attack mitigation test metrics f... Fri, Jan 1 2016Standard
Time-stamping services -- Part 1: Framework
"This part of ISO/IEC 18014: — identifies the objective of a time-stamping authority; —... Mon, Sep 1 2008Standard
Time-stamping services -- Part 2: Mechanisms producing independent tokens
This part of ISO/IEC 18014 presents a general framework for the provision of time-stamp... Tue, Dec 1 2009Standard
Time-stamping services -- Part 4: Traceability of time sources
This part of ISO/IEC 18014 — defines the functionality of the time assessment authority... Wed, Apr 1 2015Working group
Top Threats
The shift from traditional client/server to service-based models is transforming the wa...Standard
Vehicle to grid communication interface - Part 1: General information and use-case definition
This document, as a basis for the other parts of the ISO 15118 series, specifies terms ... Wed, May 1 2019Standard
Vehicle to grid Communication interface - Part 3: Physical and data link layer requirements
ISO 15118-3:2015 specifies the requirements of the physical and data link layer for a h... Wed, Oct 2 2019Standard
Vehicle to grid communication interface - Part 4: Network and application protocol conformance test
ISO 15118-4:2018 specifies conformance tests in the form of an Abstract Test Suite (ATS... Fri, Feb 1 2019Standard
Vehicle to grid communication interface - Part 5: Physical layer and data link layer conformance test
ISO 15118-5:2018 specifies conformance tests in the form of an Abstract Test Suite (ATS... Fri, Feb 1 2019Standard
Vehicle to grid communication interface - Part 8: Physical layer and data link layer requirements for wireless communication
ISO 15118-8:2018 specifies the requirements of the physical and data link layer of a wi... Fri, Feb 1 2019Standard
Vehicle-to-grid communication Interface - Part 2: Network and application protocol requirements
ISO 15118-2:2014 specifies the communication between battery electric vehicles (BEV) or... Fri, Apr 1 2016Standard
Vulnerability disclosure
In the contexts of information technology and cybersecurity, a vulnerability is a behav... Mon, Oct 1 2018Standard
Web Authentication: An API for accessing Public Key Credentials Level 1
This specification defines an API enabling the creation and use of strong, attested, sc... Mon, Mar 4 2019Standard
Web Authentication: An API for accessing Public Key Credentials Level 2
This specification defines an API enabling the creation and use of strong, attested, sc... Tue, Jun 4 2019Standard
Web Cryptography API
This specification describes a JavaScript API for performing basic cryptographic operat... Thu, Jan 26 2017Standard
X.1712 (Security requirements and measures for QKD networks - key management)
Recommendation ITU-T X.1712 specifies security threats and security requirements for ke... Tue, Feb 9 2021 (Wed, Feb 10 2021)Standard
X.sec-QKDN-tn (Security requirements and designs for quantum key distribution networks - trusted node)
The objective of this Recommendation is to provide guidance on security requirements fo...Standard
Y.4457 - Architectural framework for transportation safety services
This Recommendation addresses a transportation safety management model that describes d... Sat, Jun 30 2018Standard