ISO TS 25237 Health informatics — Pseudonymization - First Edition
Список продуктов
Данный раздел/документ содержится в продуктах:
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- 35
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- 35.240
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- ISO ISO/IEC 9798-3 CORR 2 Information technology - security techniques - entity Authentication - Part 3: Mechanisms using digital signature techniques Technical corrigendum 2 - Second Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- DIN EN ISO 22600-1 Health informatics - Privilege management and access control - Part 1: Overview and policy management (ISO 22600-1:2014)
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- ISO 17090-3 Health informatics — Public key infrastructure — Part 3: Policy management of certification authority - First Edition
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 10181-1 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Overview
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 15945 Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 14888-2 Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 13888-1 Information technology - Security techniques - Non-repudiation Part 1: General
- BSI BS ISO/IEC 17799 Information technology. Safety Engineering. Code of Good Practice for the management of the security of the information - To Purchase Call 1-800-854-7179 USA/Canada or 303-397-7956 Worldwide
- BSI PD ISO/TR 21548 Health informatics - Security requirements for archiving of electronic health records - Guidelines
- BSI BS EN ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002
- ISO ISO/IEC 24727-4 Identification cards - Integrated circuit card programming interfaces - Part 4: Application programming interface (API) administration - First Edition
- Картотека зарубежных и международных стандартов
Ссылается на
- В списке элементов: 5
- ISO 27799 Health informatics - Information security management in health using ISO/IEC 27002 - Second EditionМедицинская информатика - управление информационной безопасностью в здоровье с помощью ISO/IEC 27002 - Второй Выпуск
Карточка документа - ISO ISO/IEC 8825-1 Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) - Fifth EditionИнформационные технологии - правила кодирования ASN.1: Спецификация Базовых правил кодирования (BER), Canonical Encoding Rules (CER) и Distinguished Encoding Rules (DER) - Пятый Выпуск
Карточка документа - ISO ISO/IEC 15408-2 Information technology - Security techniques - Evaluation criteria for IT security - Part 2: Security functional components - Third EditionИнформационные технологии - методы Безопасности - критерии Оценки безопасности IT-систем - Часть 2: функциональные компоненты Безопасности - Третий Выпуск
На основе ISO ISO/IEC 15408-2 разработан ГОСТ Р ИСО/МЭК 15408-2-2013 (IDT)ГОСТ Р ИСО/МЭК 15408-2-2013 (IDT) - CEN ENV 13608-1 Health Informatics - Security for Healthcare Communication - Part 1: Concepts and TerminologyМедицинская информатика - безопасность для коммуникации здравоохранения - часть 1: понятия и терминология
Карточка документа - ISO 7498-2 Information Processing Systems - Open Systems Interconnection - Basic Reference Model - Part 2: Security Architecture - First EditionСистемы обработки информации - взаимодействие открытых систем - основная эталонная модель - часть 2: архитектура безопасности - первый выпуск
На основе ISO 7498-2 разработан ГОСТ Р ИСО 7498-2-99 (IDT)ГОСТ Р ИСО 7498-2-99 (IDT)



