Standards Watch

  • Home
  • Standards Watch

Click on the interactive map below or utilise the filtering interface on the side to browse the items that are currently in our Standards Watch*.

IT_general it_security software networking cloud computing other iot big data ai cybersecurity data tecnologies iso iec 27005 5g communications iso iec etsi osi it terminal application information computer grafics information coding office machine interface interconnection equipment languages used in it microprocessor system data storage services

The Standards Watch of StandICT.eu monitors the status of ICT standards at international level, starting from the five priority areas of the Digital Single Market: 5G communications,cloud computing,cybersecurity,data technology, and IoT – Internet of Things.

In particular, special attention is given to the rapidly evolving ICT topics of: Artificial Intelligence, Big Data, IoT. Gradually, the Standards Watch will be expanded to other ICT domains and topics, with the aim of better identifying gaps, needs & opportunities and consequently stimulating European Experts to pursue the openings granted by the StandICT.eu initiative.

The WG considers national and international standards for adoption in the domain of management system standards including supporting control sets covering information and cyber security. Where not being developed by other SDO's, the WG may develop CEN/CENELEC publications in this domain.

Submit a comment here

Read more

Preparation of a first draft business plan - Review the task list ( N08) provided by the CEN-CLC Cybersecurity Coordination Group (CSCG) and asses how these tasks could be taken up in the upcoming TC 13 work

Submit a comment here

Read more

This document establishes

  • architectures of biometric comparison using an ICC,
  • on-card biometric comparison, both in sensor-off-card systems and as part of biometric system-on-card,
  • work-sharing on-card biometric comparison, and
  • security policies for on-card biometric comparison.

This document does not establish

  • requirements for off-card biometric comparison,
  • requirements for biometric system-on-card (as defined in ISO/IEC 17839), or
  • modality-specific requirements for storage and comparison.
October 2018
Submit a comment here

Read more

ISO/IEC 24727 specifies a set of programming interfaces and protocols enabling interactions between integrated circuit cards (ICCs) and applications resident on a variety of computer platforms. The ICCs provide generic services for multi-sector use by the applications. The organization and the operation of the ICCs conform to ISO/IEC 7816 4. It is anticipated that some application domains will seek to achieve interoperability through ISO/IEC 24727 facilities even though the applications pre-exist these facilities.

June 2014
Submit a comment here

Read more

ISO 17839-2:2015 defines the following:
- Dimensions of a Biometric System-on-Card type S1 and type S2;
- Position and size of the biometric capture device;
- Minimum requirements to a Biometric System-on-Card with respect to

  • mechanical durability, and
  • man-machine interface and ergonomics.

The standardization of other on-card devices such as an electronic display or a keypad is outside the scope of this part of ISO/IEC 17839.

August 2015
Submit a comment here

Read more

ISO/IEC 7816-9:2017 specifies interindustry commands for card, file and other structure management, i.e. data object and security object. These commands cover the entire life cycle of the card and therefore some commands are used before the card has been issued to the cardholder or after the card has expired. For details on record life cycle status, refer to ISO/IEC 7816-4.

ISO/IEC 7816-9:2017 is not applicable to the internal implementation within the card and/or the outside world.

December 2017
Submit a comment here

Read more

The “Software Defined Perimeter (SDP) protocol,” is designed to provide on-demand, dynamically provisioned, air-gapped networks. Air-gapped networks are trusted networks that are isolated from all unsecured networks and this may allow them to mitigate network-based attacks. The SDP protocol is based on workflows invented by the Department of Defense (DoD) and used by some Federal Agencies. Networks based on these workflows provide a higher level of security, but are thought to be very difficult to use compared to traditional enterprise networks.
 

April 2014
Submit a comment here

Read more

The CSA Open Certification WG is an industry initiative to allow global, accredited, trusted certification of cloud providers. It is a program for flexible, incremental and multi-layered cloud provider certification according to the CSA’s industry leading security guidance and control objectives. The program will integrate with popular third-party assessment and attestation statements developed within the public accounting community to avoid duplication of effort and cost.

August 2012
Submit a comment here

Read more

Pages