Standards/standards1 Min Read homerpaponMarch 6, 2025 Data Residency Challenges As data is increasingly accessed and shared across geographic boundaries, a growing web of conflicting laws and regulations dictate where data…
Standards/standards1 Min Read homerpaponMarch 6, 2025 Data Format Description Language (DFDL) v1.0 Specification This document provides a definition of a standard Data Format Description Language (DFDL). This language allows description of text, dense…
Standards/standards1 Min Read homerpaponMarch 6, 2025 Data aware networking (information centric networking) – Requirements and capabilities This Recommendation specifies the requirements and capabilities of data aware networking (DAN) to realize the use cases and scenarios…
Standards/standards1 Min Read homerpaponMarch 6, 2025 Cybersecurity and ISO and IEC Standards This document provides guidance on how to leverage existing standards in a cybersecurity framework. The concepts behind information security…
Standards/standards1 Min Read homerpaponMarch 6, 2025 Cyber Security for Consumer Internet of Things: Conformance Assessment of Baseline Requirements The present document specifies a conformance assessment methodology for consumer IoT devices, their relation to associated services and…
Standards/standards1 Min Read homerpaponMarch 6, 2025 Cyber Security for Consumer Internet of Things The present document specifies high-level provisions for the security of consumer devices that are connected to network infrastructure, such…
Standards/standards1 Min Read homerpaponMarch 6, 2025 CWL, Common Workflow Language Standards, v1.2 The Common Workflow Language (CWL) is an open standard for describing analysis workflows and tools in a way that makes them portable and…
Standards/standards1 Min Read homerpaponMarch 6, 2025 CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new…
Standards/standards1 Min Read homerpaponMarch 6, 2025 Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1. This document…