Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 7 of 7 results

IEEE - COMP - IEEE STANDARD COMPUTER DICTIONARY COMPILATION OF IEEE STANDARD COMPUTER GLOSSARIES - IEEE COMPUTER SOCIETY DOCUMENT Organization: IEEE
Date: 1990-01-01
Description: The IEEE designations and subject matter of these glossaries are as follows:IEEE Std 1084 [610.1]-1986 Mathematics of Computing TerminologyIEEE Std 610.2-1987 Computer Applications TerminologyIEEE Std 610.3-1989 Modeling and Simulation TerminologyIEEE Std 610.4-1990 Image Processing and Pattern Recognition Terminology IEEE Std 610.5-1990 Data Management TerminologyIEEE Std 610.12 [729]-1990 Software Engineering TerminologyThe remaining glossaries in the series are listed below.
IEEE - IEEE 1008 - SOFTWARE UNIT TESTING Organization: IEEE
Date: 1987-01-01
Description: This standard may be applied to the unit testing of any digital computer software or firmware. However, this standard does not specify any class of software or Þrmware to which it must be applied, nor does it specify any class of software or Þrmware that must be unit tested.
IEEE - IEEE 610.12 - STANDARD GLOSSARY OF SOFTWARE ENGINEERING TERMINOLOGY - REVISION AND REDESIGNATION OF IEEE STD 729-1983; CORRECTED EDITION; IEEE COMPUTER SOCIETY DOCUMENT Organization: IEEE
Date: 1990-01-01
Description: (This Foreword is not a part of IEEE Std 610.12-1990, IEEE Standard Glossary of Software Engineering Terminology.)
IEC/TS 62351-8 - POWER SYSTEMS MANAGEMENT AND ASSOCIATED INFORMATION EXCHANGE – DATA AND COMMUNICATIONS SECURITY – PART 8: ROLE-BASED ACCESS CONTROL - EDITION 1.0 Organization: IEC
Date: 2011-09-01
Description: RBAC is recognized as a potentially efficient and safe means to control access to data objects. Existing standards (see [ANSI INCITS 359-2004], [IEC 62443], and [IEEE 802.1X-2004]) in the process control industry and access control ([RFC2904] and [RFC2905]) are not sufficient as none of them specify either the exact role name and associated rights, the format of the access tokens or the detailed mechanism by which access tokens are transferred to and authenticated by the target system – however, all this information is needed though for interoperability.
CLSI AUTO11 - INFORMATION TECHNOLOGY SECURITY OF IN VITRO DIAGNOSTIC INSTRUMENTS AND SOFTWARE SYSTEMS; APPROVED STANDARD - SECOND EDITION; VOL 34; NO 17 Organization: CLSI
Date: 2014-10-01
Description: For example, local organizations will need to include in their own documentation the technical and process aspects of medical device security addressed by other standards organizations, such as the International Organization for Standardization (ISO) and IEEE. In addition, this standard may not apply to certain devices used in health care (see Chapter 4.8).
TIA-1039 - QOS SIGNALING FOR IP QOS SUPPORT AND SENDER AUTHENTICATION Organization: TIA
Date: 2011-08-01
Description: This version of TIA-1039A adds a new capability to improve network security through session authentication. Security against cyber crime has thus far been mainly focused on the computer but this battle is being lost; more software holes are found each month than can be patched.
NPFC - MIL-D-81992 - DIRECTIVES, TECHNICAL; PREPARATION OF Organization: NPFC
Date: 1994-07-27
Description: For the purposes of this specification, Software System items include the following: a. Airborne Software. b. Automatic Test Equipment (ATE) and Peculiar Support Equipment (PSE) software.

1 - 7 of 7 results