1 Min Read onMarch 6, 2025 Cybersecurity and ISO and IEC Standards This document provides guidance on how to leverage existing standards in a cybersecurity framework. The concepts behind information security…
1 Min Read onMarch 6, 2025 Data aware networking (information centric networking) – Requirements and capabilities This Recommendation specifies the requirements and capabilities of data aware networking (DAN) to realize the use cases and scenarios…
1 Min Read onMarch 6, 2025 Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1. This document…
1 Min Read onMarch 6, 2025 CSAF Common Vulnerability Reporting Framework (CVRF) Version 1.2 The OASIS CSAF Technical Committee is chartered to make a major revision to the Common Vulnerability Reporting Framework (CVRF) under a new…
1 Min Read onMarch 6, 2025 CWL, Common Workflow Language Standards, v1.2 The Common Workflow Language (CWL) is an open standard for describing analysis workflows and tools in a way that makes them portable and…
1 Min Read onMarch 6, 2025 Cyber Security for Consumer Internet of Things The present document specifies high-level provisions for the security of consumer devices that are connected to network infrastructure, such…
1 Min Read onMarch 6, 2025 Credential Management Level 1 This specification describes an imperative API enabling a website to request a user’s credentials from a user agent, and to help the user…
1 Min Read onMarch 6, 2025 Cryptographic algorithms and security mechanisms conformance testing This document gives guidelines for cryptographic algorithms and security mechanisms conformance testing methods. Conformance testing assures…
1 Min Read onMarch 6, 2025 Cryptographic techniques based on elliptic curves — Part 1: General This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve…