Find the standard you are looking for at Engineering360. Documents are available for purchase from the IHS Standards Store.

1 - 7 of 7 results

ETSI - GS QKD 008 - QUANTUM KEY DISTRIBUTION (QKD); QKD MODULE SECURITY SPECIFICATION - V1.1.1 Organization: ETSI
Date: 2010-12-01
Description: The principal objective is to detect any possible penetration with high probability, and resulting in the immediate zeroization of all Critical Security Parameters in plain text.
ATA - GLPPS - ATA GUIDELINES FOR LOSS PREVENTION PHYSICAL SECURITY IN MOTOR CARRIER FREIGHT TERMINALS Organization: ATA
Description: The handbook addresses a variety of issues, including terminal security, personnel selection and training, seal handling procedures, high-value freight, and more.
DSF/FPREN 419241-1 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING – PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS Organization: DS
Description: This standard is technology and protocol neutral and focuses on security requirements. 1.2 Outside of the scope The following aspects are considered outside of the scope of this document: - other trusted services that may be used alongside this service such as certificate issuance, signature validation service, time-stamping service and information preservation service; - any application or system outside of the TW4S (in particular the signature creation application including the creation of advanced signature formats); - signing key and signing certificate import from CAs; - the legal interpretation of the form of signature (e.g. electronic signature, electronic seal, qualified or otherwise). 1.3 Audience This standard specifies security requirements that are intended to be followed by: - providers of TW4S systems; - Trust Service Providers (TSP) offering a signature creation service.
CEN - PREN 419241-1 - TRUSTWORTHY SYSTEMS SUPPORTING SERVER SIGNING - PART 1: GENERAL SYSTEM SECURITY REQUIREMENTS Organization: CEN
Date: 2017-03-01
Description: Out of scope The following aspects are considered out of scope: — other trusted services that may be used alongside this service such as certificate issuance, signature validation service, time-stamping service and information preservation service; — any application or system outside of the TW4S (in particular the signature creation application including the creation of advanced signature formats); — signing key and signing certificate import from CAs; — the legal interpretation of the form of signature (e.g. electronic signature, electronic seal, qualified or otherwise). Audience This standard specifies security requirements that are intended to be followed by: — providers of TW4S systems; — Trust Service Providers (TSP) offering a signature creation service.
ETSI - TS 119 312 - ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES - V1.2.1 Organization: ETSI
Date: 2017-05-01
Description: The use of SOG-IS agreed mechanisms is meant to help ensure a high level of security in the recommended cryptographic suites, while the focus on specific suites of mechanisms is meant to increase interoperability and simplify design choices.
CRC - KE26132 - 14 MEV NEUTRONS : PHYSICS AND APPLICATIONS Organization: CRC
Date: 2015-08-25
Description: Drawing on his more than 50 years of experience working with 14 MeV neutrons, the author focuses on: Sources of 14 MeV neutrons, including laboratory size accelerators, small and sealed tube generators, well logging sealed tube accelerators, neutron generators with detection of associated alpha particles, plasma devices, high flux sources, and laser-generated neutron sources Nuclear reactions with 14 MeV neutrons, including measurements of energy spectra, angular distributions, and deductions of reaction mechanism Nuclear reactions with three particles in the final state induced by neutrons and the identification of effects of final state interaction, quasi-free scattering, and charge-dependence of nuclear forces Charged particle and neutron detection methods, particularly position-sensitive detectors Industrial applications of nuclear analytical methods, especially in the metallurgy and coal industries Quality assurance and quality control measures for nuclear analytical methods Nuclear and atomic physics-based technology for combating illicit trafficking and terrorism Medical applications, including radiography, radiotherapy, in vivo neutron activation analysis, boron neutron therapy, collimated neutron beams, and dosimetry This book reflects the exciting developments in both fundamental nuclear physics and the application of fast neutrons to many practical problems.
CRC - PSYCHOLOGICAL ASPECTS OF - PSYCHOLOGICAL ASPECTS OF CRISIS NEGOTIATION Organization: CRC
Date: 2005-10-14
Description: Colonel Archie Vandergrift, and later Special Agent and former Navy Seal Tom Norris at the Academy (Anderson, 1983). It was my honor to be one of their instructors.

1 - 7 of 7 results