ISO Update Supplement to Isofocus

Total Page:16

File Type:pdf, Size:1020Kb

ISO Update Supplement to Isofocus ISO Update Supplement to ISOfocus January 2017 International Standards in process ISO/CD 7240-7 Fire detection and alarm systems — Part 7: Point-type smoke detectors using scattered An International Standard is the result of an agreement between light, transmitted light or ionization the member bodies of ISO. A first important step towards an Interna- TC 22 Road vehicles tional Standard takes the form of a committee draft (CD) - this is cir- ISO/CD Road vehicles — Automotive cables — Part 1: culated for study within an ISO technical committee. When consensus 19642-1 Terminology has been reached within the technical committee, the document is sent to the Central Secretariat for processing as a draft International ISO/CD Road vehicles — Automotive cables — Part 2: Standard (DIS). The DIS requires approval by at least 75 % of the 19642-2 Test methods member bodies casting a vote. A confirmation vote is subsequently ISO/CD Road vehicles — Automotive cables — Part 3: carried out on a final draft International Standard (FDIS), the approval 19642-3 Dimensions and requirements for 30 V a.c. or criteria remaining the same. 60 V d.c. single core copper conductor cables ISO/CD Road vehicles — Automotive cables — Part 19642-4 4: Dimensions and requirements for 30 V a.c. and 60 V d.c. single core aluminium conductor cables ISO/CD Road vehicles — Automotive cables — Part 5: 19642-5 Dimensions and requirements for 600 V a.c. or 900 V d.c., 1000 V a.c. or 1500 V d.c. single CD registered core copper conductor cables ISO/CD Road vehicles — Automotive cables — Part 6: 19642-6 Dimensions and requirements for 600 V a.c. or 900 V d.c., 1000 V a.c. or 1500 V d.c. single Period from 01 December to 31 December 2016 core aluminium conductor cables These documents are currently under consideration in the technical ISO/CD Road vehicles — Automotive cables — Part committee. 19642-7 7: Dimensions and requirements for 30 V a.c. They have been registred at the Central Secretariat. or 60 V d.c. round, sheathed, screened and unscreened multi and single core copper con- ductor cables PC 302 Guidelines for auditing management ISO/CD Road vehicles — Automotive cables — Part systems 19642-8 8: Dimensions and requirements for 30 V a.c. ISO/CD 19011 Guidelines for auditing management systems or 60 V d.c. round, sheathed, screened and unscreened multi and single core aluminium TC 6 Paper, board and pulps conductor cables ISO/CD 21993 Paper and Pulp — Deinkability test for printed ISO/CD Road vehicles — Automotive cables — Part 9: paper products 19642-9 Dimensions and requirements for 600 V a.c. or TC 8 Ships and marine technology 900 V d.c., 1000 V a.c. or 1500 V d.c. round, sheathed, screened and unscreened multi and ISO/CD 21157 Ships and marine technology — Ball valves for single core copper conductor cables use in low temperature applications — Design and testing requirements ISO/CD Road vehicles — Automotive cables — Part 10: 19642-10 Dimensions and requirements for 600 V a.c. or ISO/CD 21159 Ships and marine technology — Butterfly 900 V d.c., 1000 V a.c. or 1500 V d.c. round, valves for use in low temperature applications sheathed, screened and unscreened multi and — Design and testing requirements single core aluminium conductor cables ISO/CD 8384 Ships and marine technology — Dredgers ISO/CD 16232 Road Vehicles — Cleanliness of components — Vocabulary and systems ISO/CD 8385 Ships and marine technology — Dredgers TC 25 Cast irons and pig irons — Classification ISO/CD 945-4 Microstructure of cast irons — Part 4: Test TC 20 Aircraft and space vehicles method for determining nodularity in spheroidal ISO/DTR Flight dynamics — Concepts, quantities and graphite cast irons 1151-13 symbols — Part 13: Training devices TC 34 Food products ISO/DTR Flight dynamics — Concepts, quantities and ISO/CD 21846 Determination of composition of triacylglycer- 1151-14 symbols — Part 14: Helicopters: classification, ols and content of di-acylglycerols by capillary geometry and dynamic characteristics gas chromatography, in vegetable oils ISO/CD 10794 Space systems — Programme management — Material, mechanical parts and processes TC 38 Textiles ISO/CD 10795 Space systems — Programme management ISO/CD 10290 Textiles — Cotton yarns — Specifications and quality — Vocabulary ISO/CD 20920 Textiles - Man-made fibres -Determination ISO/DTS Space systems — Requirements for the of dye-uptake of cationic dyeable modified 18667 management of capability-based safety, polyester fibres dependability, and quality assurance (SD&QA) TC 42 Photography programme ISO/CD 15781 Photography — Digital still cameras — Meas- TC 21 Equipment for fire protection and fire uring shooting time lag, shutter release time fighting lag, shooting rate, and start-up time ISO/CD 19093 Photography — Digital cameras — Measuring low light performance ISO Update, Supplement to ISO Focus -- January 2017 1 TC 60 Gears ISO/CD Automation systems and integration — Evalu- 20140-3 ating energy efficiency and other factors of ISO/DTS Calculation of scuffing load capacity of cylindri- manufacturing systems that influence the envi- 13989-1 cal, bevel and hypoid gears — Part 1: Flash ronment — Part 3: Environmental performance temperature method evaluation data aggregation process ISO/DTS Calculation of scuffing load capacity of cylindri- 13989-2 cal, bevel and hypoid gears — Part 2: Integral TC 190 Soil quality temperature method ISO/CD 21285 Soil quality — Reproduction test for testing the quality of soils using the predatory mite TC 83 Sports and other recreational facilities Hypoaspis aculeifer (Gamasina, Acari) and equipment ISO/CD 21286 Soil quality — General guidance on the use of ISO/CD 20739 Martial arts — Tai chi clothing — Requirements DNA barcoding in ecotoxicological testing and test method TC 197 Hydrogen technologies ISO/CD 20740 Martial arts — Wushu sword — Requirements and test method ISO/CD TR Applications for hydrogen absorbed in revers- 16113 ible metal hydrides not covered in ISO 16111 TC 85 Nuclear energy, nuclear technologies, and radiological protection TC 204 Intelligent transport systems ISO/CD Radiological protection — Monitoring and ISO/DTR Intelligent transport systems — Public trans- 16638-2 internal dosimetry for specific materials — Part 20526 port — Account-based ticketing standards 2: Ingestion of uranium compounds requirements TC 92 Fire safety ISO/DTR Intelligent transport systems — Spatio-tem- 21718 poral data dictionary for cooperative ITS and ISO/DTR Guidance on the calculation of asymmetrical automated driving systems 21721 partitions/vertical membranes with respect to their fire resistance performance TC 205 Building environment design TC 104 Freight containers ISO/CD 19454 Building Environment Design — Indoor envi- ronment — Daylight opening design process ISO/CD 1496-2 Series 1 freight containers — Specification and in order to ensure sustainability principles in testing — Part 2: Thermal containers visual environment ISO/CD 1496-5 Series 1 freight containers — Specification and TC 206 Fine ceramics testing — Part 5: Platform and platform-based containers ISO/CD 21066 Fine ceramics (advanced ceramics, advanced technical ceramics) — Qualitative and semi- ISO/DTS Freight Containers — Tracking and Monitoring quantitative assessment of the photocatalytic 18625 System: Requirements activities of surfaces by the reduction of resa- TC 105 Steel wire ropes zurin in a deposited ink film ISO/CD 19427 Steel wire ropes — Pre-fabricated Parallel Wire TC 215 Health informatics Strands for Suspension Bridge Main Cable ISO/DTS Health Informatics — Requirements for a re- — Specifications 19293 cord of the dispense of a medicinal product TC 126 Tobacco and tobacco products TC 228 Tourism and related services ISO/CD 20768 Vapour products — Routine analytical vaping ISO/CD 21401 Accommodation facilities — Sustainability machine — Definitions and management system — Requirements standard conditions TC 251 Asset management TC 130 Graphic technology ISO/CD 55002 Asset management — Management systems ISO/CD 20677 Image technology colour management — — Guidelines for the application of ISO 55001 Extensions to architecture, profile format, and data structure TC 285 Clean cookstoves and clean cooking solutions TC 134 Fertilizers and soil conditioners ISO/CD 19869 Clean cookstoves and clean cooking solu- ISO/CD 20978 Neutralising value mesurement (or tions — Guidance on field testing methods for Determination) cookstoves TC 171 Document management applications JTC 1 Information technology ISO/CD Document management applications — Mini- ISO/IEC PDTR Information technology — Big data reference 19475-3 mum requirements for the storage of docu- 20547-5 architecture — Part 5: Standards roadmap ments — Part 3: Disposal ISO/IEC PDTR Software and systems engineering-- Lifecycle TC 172 Optics and photonics 29110-5-1-4 profiles for very small entities (VSEs) — Part ISO/CD 21575 Optics and photonics — Test method for water 5-1-4: Software engineering: Management resistance of optical glass by powder method and engineering guide: Generic profile group: Advanced profile ISO/CD 19986 Lasers and laser-related equipment — Test method for angle resolved scattering ISO/IEC PDTS Information technology — Programming 19216 languages, their environments and systems TC 184 Automation systems and integration software interfaces - Networking ISO/CD Data quality — Part 62: Process maturity as- ISO/IEC PDTS C++ Extensions for ranges 8000-62 sessment model 21425 ISO/CD Data quality — Part 63: Measurement ISO/IEC CD Information technology
Recommended publications
  • 2018-07-11 and for Information to the Iso Member Bodies and to the Tmb Members
    Sergio Mujica Secretary-General TO THE CHAIRS AND SECRETARIES OF ISO COMMITTEES 2018-07-11 AND FOR INFORMATION TO THE ISO MEMBER BODIES AND TO THE TMB MEMBERS ISO/IEC/ITU coordination – New work items Dear Sir or Madam, Please find attached the lists of IEC, ITU and ISO new work items issued in June 2018. If you wish more information about IEC technical committees and subcommittees, please access: http://www.iec.ch/. Click on the last option to the right: Advanced Search and then click on: Documents / Projects / Work Programme. In case of need, a copy of an actual IEC new work item may be obtained by contacting [email protected]. Please note for your information that in the annexed table from IEC the "document reference" 22F/188/NP means a new work item from IEC Committee 22, Subcommittee F. If you wish to look at the ISO new work items, please access: http://isotc.iso.org/pp/. On the ISO Project Portal you can find all information about the ISO projects, by committee, document number or project ID, or choose the option "Stages search" and select "Search" to obtain the annexed list of ISO new work items. Yours sincerely, Sergio Mujica Secretary-General Enclosures ISO New work items 1 of 8 2018-07-11 Alert Detailed alert Timeframe Reference Document title Developing committee VA Registration dCurrent stage Stage date Guidance for multiple organizations implementing a common Warning Warning – NP decision SDT 36 ISO/NP 50009 (ISO50001) EnMS ISO/TC 301 - - 10.60 2018-06-10 Warning Warning – NP decision SDT 36 ISO/NP 31050 Guidance for managing
    [Show full text]
  • ECSO State of the Art Syllabus V1 ABOUT ECSO
    STATE OF THE ART SYLLABUS Overview of existing Cybersecurity standards and certification schemes WG1 I Standardisation, certification, labelling and supply chain management JUNE 2017 ECSO State of the Art Syllabus v1 ABOUT ECSO The European Cyber Security Organisation (ECSO) ASBL is a fully self-financed non-for-profit organisation under the Belgian law, established in June 2016. ECSO represents the contractual counterpart to the European Commission for the implementation of the Cyber Security contractual Public-Private Partnership (cPPP). ECSO members include a wide variety of stakeholders across EU Member States, EEA / EFTA Countries and H2020 associated countries, such as large companies, SMEs and Start-ups, research centres, universities, end-users, operators, clusters and association as well as European Member State’s local, regional and national administrations. More information about ECSO and its work can be found at www.ecs-org.eu. Contact For queries in relation to this document, please use [email protected]. For media enquiries about this document, please use [email protected]. Disclaimer The document was intended for reference purposes by ECSO WG1 and was allowed to be distributed outside ECSO. Despite the authors’ best efforts, no guarantee is given that the information in this document is complete and accurate. Readers of this document are encouraged to send any missing information or corrections to the ECSO WG1, please use [email protected]. This document integrates the contributions received from ECSO members until April 2017. Cybersecurity is a very dynamic field. As a result, standards and schemes for assessing Cybersecurity are being developed and updated frequently.
    [Show full text]
  • Iso 14644-4:2001(E)
    INTERNATIONAL ISO STANDARD 14644-4 First edition 2001-04-01 Cleanrooms and associated controlled environments — Part 4: Design, construction and start-up Salles propres et environnements maîtrisés apparentés — Partie 4: Conception, construction et mise en fonctionnement Reference number ISO 14644-4:2001(E) © ISO 2001 Dit document mag slechts op een stand-alone PC worden geïnstalleerd. Gebruik netwerk is alleen toegestaan als een aanvullende licentieovereenkomst voor netwerkgebruik met NEN is afgesloten. This document may only be used on a stand-alone PC. Use in network is permitted when supplementary license agreement for use in a network with NEN has been concluded. Dit document is door NEN onder licentie verstrekt aan: / This document has been supplied under license by NEN to: GTI N.V. M.R. Janmohamed 2004/10/15 ISO 14644-4:2001(E) PDF disclaimer This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat accepts no liability in this area. Adobe is a trademark of Adobe Systems Incorporated. Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies.
    [Show full text]
  • Iso 22301:2019
    INTERNATIONAL ISO STANDARD 22301 Second edition 2019-10 Security and resilience — Business continuity management systems — Requirements Sécurité et résilience — Systèmes de management de la continuité d'activité — Exigences Reference number ISO 22301:2019(E) © ISO 2019 ISO 22301:2019(E) COPYRIGHT PROTECTED DOCUMENT © ISO 2019 All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester. ISO copyright office CP 401 • Ch. de Blandonnet 8 CH-1214 Vernier, Geneva Phone: +41 22 749 01 11 Fax:Website: +41 22www.iso.org 749 09 47 Email: [email protected] iiPublished in Switzerland © ISO 2019 – All rights reserved ISO 22301:2019(E) Contents Page Foreword ..........................................................................................................................................................................................................................................v Introduction ................................................................................................................................................................................................................................vi 1 Scope ................................................................................................................................................................................................................................
    [Show full text]
  • Guidelines on Cryptographic Algorithms Usage and Key Management
    EPC342-08 Version 7.0 4 November 2017 [X] Public – [ ] Internal Use – [ ] Confidential – [ ] Strictest Confidence Distribution: Publicly available GUIDELINES ON CRYPTOGRAPHIC ALGORITHMS USAGE AND KEY MANAGEMENT Abstract This document defines guidelines on cryptographic algorithms usage and key management. Document Reference EPC342-08 Issue Version 7.0 Date of Issue 22 November 2017 Reason for Issue Maintenance of document Produced by EPC Authorised by EPC Document History This document was first produced by ECBS as TR 406, with its latest ECBS version published in September 2005. The document has been handed over to the EPC which is responsible for its yearly maintenance. DISCLAIMER: Whilst the European Payments Council (EPC) has used its best endeavours to make sure that all the information, data, documentation (including references) and other material in the present document are accurate and complete, it does not accept liability for any errors or omissions. EPC will not be liable for any claims or losses of any nature arising directly or indirectly from use of the information, data, documentation or other material in the present document. Conseil Européen des Paiements AISBL– Cours Saint-Michel 30A – B 1040 Brussels Tel: +32 2 733 35 33 – Fax: +32 2 736 49 88 Enterprise N° 0873.268.927 – www.epc-cep.eu – [email protected] © 2016 Copyright European Payments Council (EPC) AISBL: Reproduction for non-commercial purposes is authorised, with acknowledgement of the source Table of Content MANAGEMENT SUMMARY ............................................................. 5 1 INTRODUCTION .................................................................... 7 1.1 Scope of the document ...................................................... 7 1.2 Document structure .......................................................... 7 1.3 Recommendations ............................................................ 8 1.4 Implementation best practices .........................................
    [Show full text]
  • En Iso 22300
    Terminology in Crisis and Disaster Management CEN Workshop Agreement Georg Neubauer, AIT http://www.ait.ac.at Background . The FP7 project EPISECC develops a concept of a common information space including taxonomy building to improve interoperability between European crisis managers and stakeholders . EPISECC is mandated to provide the outcome of its research to international standardisation – involvement in CEN TC391 . Within the FP7 project DRIVER a standard on terminology in crisis management shall be developed (among multiple other goals) . DRIVER & EPISECC will jointly co-operate on this issue . Additional support is planned from the FP7 projects REDIRNET, SECINCORE and SECTOR (all dealing with interoperability) 2 Scope and Purpose . Provision of an overview of existing terminologies and definitions applied in multiple domains of crisis and disaster management . Overview on synonyms with the same or similar definitions . Overview on different definitions for the same term . Benefit: Support enhancement of mutual understanding of users/organizations applying different standards/taxonomies . Benefit: Potential long term perspective: enhanced use of most suitable terms and definitions arising from multiple sources 3 Scope and Purpose (Example) Domain Term Definition Standard/document Intended Users situation where widespread human, material, economic or environmental losses have occurred which exceeded the ability of the affected organization (2.2.9), community or society to respond and recover using its own resources Societal security disaster ISO 22300 (2012) not specified A serious disruption of the functioning of a community or a society involving widespread human, material, economic or environmental losses and impacts, which exceeds the ability of the affected community or society to cope using its own authorities, pratictioners not specified disaster resources.
    [Show full text]
  • Risk Management in Crisis: Winners and Losers During the COVID-19 Pandemic/Piotr Jedynak and Sylwia Bąk
    Risk Management in Crisis Risk management is a domain of management which comes to the fore in crisis. This book looks at risk management under crisis conditions in the COVID-19 pandemic context. The book synthesizes existing concepts, strategies, approaches and methods of risk management and provides the results of empirical research on risk and risk management during the COVID-19 pandemic. The research outcome was based on the authors’ study on 42 enterprises of different sizes in various sectors, and these firms have either been negatively affected by COVID-19 or have thrived successfully under the new conditions of conducting business activities. The anal- ysis looks at both the impact of the COVID-19 pandemic on the selected enter- prises and the risk management measures these enterprises had taken in response to the emerging global trends. The book puts together key factors which could have determined the enterprises’ failures and successes. The final part of the book reflects on how firms can build resilience in chal- lenging times and suggests a model for business resilience. The comparative anal- ysis will provide useful insights into key strategic approaches of risk management. Piotr Jedynak is Professor of Management. He works at Jagiellonian University in Cracow, Poland, where he holds the positions of Vice-Rector for Financial and HR Policy and Head of the Management Systems Department. He specializes in risk management, strategic management and management systems. He is the author of numerous publications, an auditor and consultant to many public and business organizations. Sylwia Bąk holds a PhD in Management Sciences.
    [Show full text]
  • Introducing the IBM Z15 - the Enterprise Platform for Mission-Critical Hybrid Multicloud
    IBM United States Hardware Announcement 119-027, dated September 12, 2019 Introducing the IBM z15 - The enterprise platform for mission-critical hybrid multicloud Table of contents 2 Overview 26 Product number 3 Key requirements 57 Publications 3 Planned availability date 60 Technical information 4 Description 72 Terms and conditions 22 Product positioning 74 Prices 24 Statement of general direction 117Order now 118Corrections At a glance Announcing the IBM(R) z15 Today's announcement extends the IBM Z(R) position as the industry-leading platform for mission-critical hybrid cloud, with new innovations across security, data privacy, and resilience. Data privacy and security Pervasive encryption easily encrypts all data associated with an application, database, or cloud service -- whether on premises or in the cloud, at rest or in flight. The IBM z15 extends this beyond the border of the IBM Z environment. • The new IBM Z Data Privacy Passports, in conjunction with IBM z15 and available via an IBM z15 only PID, is being designed to enforce security and privacy protections to data not only on Z, but across platforms. It provides a data-centric security solution that enables data to play an active role in its own protection. For more information about IBM Z Data Privacy Passports V1.0 beta program, see Software Announcement 219-452, dated September 12, 2019. • IBM Z Data Privacy for Diagnostics provides clients with the capability to protect sensitive data that may be included in diagnostic dumps. Now sensitive data can be tagged such that it can be identified in dumps with no impact to dump capture times.
    [Show full text]
  • Appendix No. 1 Specifications
    Government of Canada Existing Building Renovation Issued for Tender 144202775.200 St. Paul, Alberta Appendix No. 1 Specifications June 8, 2016 GOVERNMENT OF CANADA Existing Building Renovation Section 00 01 01 St. Paul, Alberta, Canada SPECIFICATION INDEX Project No.: 144202775.200 Page 1 of 4 DIVISION 02 EXISTING CONDITIONS Section 02 41 16 Selective Demolition ................................................................... 5 Section 02 83 33 Lead Abatement and Removal ..................................................... 9 Section 02 83 33.01 Initial Lead Surface Contamination Assessment ....................... 10 DIVISION 03 CONCRETE Section 03 10 00 Concrete Forming and Accessories ........................................... 10 Section 03 20 00 Concrete Reinforcing ................................................................... 7 Section 03 30 00 Cast-in Place Concrete ............................................................... 15 DIVISION 04 MASONRY Section 04 05 00 Common Work Results for Masonry ........................................... 8 Section 04 05 12 Masonry Mortar ........................................................................... 5 Section 04 05 19 Masonry Anchorage and Reinforcing .......................................... 5 Section 04 22 00 Concrete Unit Masonry ................................................................ 6 DIVISION 05 METALS Section 05 50 00 Metal Fabrications ....................................................................... 9 Section 05 72 00 Stainless Steel Fabrications
    [Show full text]
  • Linee Guida Per Lo Sviluppo E La Definizione Del Modello Nazionale
    Linee guida per lo sviluppo e la definizione del modello nazionale di riferimento per i CERT regionali AGID 13 feb 2020 Indice 1 Premessa 3 2 Riferimenti 5 2.1 Leggi...................................................5 2.2 Linee Guida e Standard.........................................5 3 Definizioni e Acronimi 7 4 Contesto 9 4.1 Quadro di riferimento nazionale.....................................9 4.2 Impianto normativo applicabile ai CERT................................ 12 4.3 Organismi a supporto della Cyber Security............................... 18 4.4 Standard per la Cyber Security...................................... 21 5 Introduzione ai CERT 31 5.1 CERT: significato e definizioni generali................................. 31 5.2 Categorie di CERT............................................ 32 5.3 Mission dei CERT............................................ 32 5.4 Identificazione della constituency.................................... 33 5.5 CERT regionali.............................................. 34 6 Modello organizzativo 39 6.1 Modello indipendente.......................................... 39 6.2 Modello incorporato........................................... 41 6.3 Modello campus............................................. 43 7 Modello amministrativo 45 8 Servizi 47 8.1 Modelli di classificazione dei servizi.................................. 47 8.2 Servizi offerti dai CERT Regionali.................................... 50 9 Processo di gestione degli incidenti di sicurezza 57 9.1 Definizioni...............................................
    [Show full text]
  • Year 2010 Issues on Cryptographic Algorithms
    Year 2010 Issues on Cryptographic Algorithms Masashi Une and Masayuki Kanda In the financial sector, cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions. Currently, the most widely used algorithms appear to be two-key triple DES and RC4 for symmetric ciphers, RSA with a 1024-bit key for an asymmetric cipher and a digital signature, and SHA-1 for a hash function according to international standards and guidelines related to the financial transactions. However, according to academic papers and reports regarding the security evaluation for such algorithms, it is difficult to ensure enough security by using the algorithms for a long time period, such as 10 or 15 years, due to advances in cryptanalysis techniques, improvement of computing power, and so on. To enhance the transition to more secure ones, National Institute of Standards and Technology (NIST) of the United States describes in various guidelines that NIST will no longer approve two-key triple DES, RSA with a 1024-bit key, and SHA-1 as the algorithms suitable for IT systems of the U.S. Federal Government after 2010. It is an important issue how to advance the transition of the algorithms in the financial sector. This paper refers to issues regarding the transition as Year 2010 issues in cryptographic algorithms. To successfully complete the transition by 2010, the deadline set by NIST, it is necessary for financial institutions to begin discussing the issues at the earliest possible date. This paper summarizes security evaluation results of the current algorithms, and describes Year 2010 issues, their impact on the financial industry, and the transition plan announced by NIST.
    [Show full text]
  • Technical Standards Catalogue VERSION 6.2
    e-Government Technical Standards Catalogue VERSION 6.2 FINAL September 2005 Technical Standards Catalogue / version 6.2 final / September 2005 1 CONTENTS 1 INTRODUCTION ...........................................................................................................................3 2 CHANGES FROM PREVIOUS VERSION..................................................................................4 3 ISSUES UNDER CONSIDERATION............................................................................................5 4 INTERCONNECTION ...................................................................................................................7 TABLE 1 SPECIFICATIONS FOR INTERCONNECTIVITY.......................................................................7 TABLE 2 SPECIFICATIONS FOR WEB SERVICES ..............................................................................10 5 DATA INTEGRATION ................................................................................................................16 TABLE 3 SPECIFICATIONS FOR DATA INTEGRATION ...........................................................................16 6 CONTENT MANAGEMENT METADATA ...............................................................................19 TABLE 4 SPECIFICATIONS FOR CONTENT MANAGEMENT METADATA .................................................19 TABLE 5 SPECIFICATIONS FOR IDENTIFIERS .......................................................................................20 7 E-SERVICES ACCESS.................................................................................................................23
    [Show full text]