IEC 60050-351:2013
|
International Electrotechnical Vocabulary (IEV) - Part 351: Control technology |
ISO/IEC 18028-1:2006
|
Information technology Security techniques IT network security Part 1: Network security management |
IEC 60870-5-102:1996
|
Telecontrol equipment and systems - Part 5: Transmission protocols - Section 102: Companion standard for the transmission of integrated totals in electric power systems |
ISO/IEC 18033-1:2015
|
Information technology Security techniques Encryption algorithms Part 1: General |
IEC 61850-7-2:2010
|
Communication networks and systems for power utility automation - Part 7-2: Basic information and communication structure - Abstract communication service interface (ACSI) |
IEC 61850-9-1:2003
|
Communication networks and systems in substations - Part 9-1: Specific Communication Service Mapping (SCSM) - Sampled values over serial unidirectional multidrop point to point link |
FIPS PUB 140 : 0001
|
SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO 9506-2:2003
|
Industrial automation systems Manufacturing Message Specification Part 2: Protocol specification |
ISO/IEC 18028-4:2005
|
Information technology Security techniques IT network security Part 4: Securing remote access |
ISO/IEC 18043:2006
|
Information technology Security techniques Selection, deployment and operations of intrusion detection systems |
IEC 60870-5-104:2006+AMD1:2016 CSV
|
Telecontrol equipment and systems - Part 5-104: Transmission protocols - Network access for IEC 60870-5-101 using standardtransport profiles |
IEC 60870-5-103:1997
|
Telecontrol equipment and systems - Part 5-103: Transmission protocols - Companion standard for the informative interface of protection equipment |
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
ISO/IEC 11770-4:2006
|
Information technology Security techniques Key management Part 4: Mechanisms based on weak secrets |
ISO 9498:1993
|
Fluorspar Experimental methods for checking the bias of sampling and sample preparation |
ISO/IEC 18014-2:2009
|
Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens |
ISO/IEC 18028-2:2006
|
Information technology Security techniques IT network security Part 2: Network security architecture |
IEEE 802.11-2016
|
IEEE Standard for Information technology--Telecommunications and information exchange between systems Local and metropolitan area networks--Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications |
ISO/IEC 19790:2012
|
Information technology Security techniques Security requirements for cryptographic modules |
ISO/IEC 10731:1994
|
Information technology Open Systems Interconnection Basic Reference Model Conventions for the definition of OSI services |
ISO/IEC 27002:2013
|
Information technology Security techniques Code of practice for information security controls |
ISO 9506-1:2003
|
Industrial automation systems Manufacturing Message Specification Part 1: Service definition |
IEC 60870-5-101:2003+AMD1:2015 CSV
|
Telecontrol equipment and systems - Part 5-101: Transmissionprotocols - Companion standard for basic telecontrol tasks |
IEC 61850-7-1:2011
|
Communication networks and systems for power utility automation - Part 7-1: Basic communication structure - Principles and models |
ISO/IEC 21827:2008
|
Information technology Security techniques Systems Security Engineering Capability Maturity Model (SSE-CMM) |
ISO 7498-2:1989
|
Information processing systems Open Systems Interconnection Basic Reference Model Part 2: Security Architecture |
IEC 61850-8-1:2011
|
Communication networks and systems for power utility automation - Part 8-1: Specific communication service mapping (SCSM) - Mappings to MMS (ISO 9506-1 and ISO 9506-2) and to ISO/IEC 8802-3 |
ISO/IEC TR 15443-3:2007
|
Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods |
IEC 61850-9-2:2011
|
Communication networks and systems for power utility automation - Part 9-2: Specific communication service mapping (SCSM) - Sampled values over ISO/IEC 8802-3 |
ISO/IEC 13888-1:2009
|
Information technology Security techniques Non-repudiation Part 1: General |
IEC 61850-7-420:2009
|
Communication networks and systems for power utility automation - Part 7-420: Basic communication structure - Distributed energy resources logical nodes |
ISO/IEC 10181-2:1996
|
Information technology Open Systems Interconnection Security frameworks for open systems: Authentication framework |
IEC 61850-7-4:2010
|
Communication networks and systems for power utility automation - Part 7-4: Basic communication structure - Compatible logical node classes and data object classes |
FIPS PUB 186 : 0
|
DIGITAL SIGNATURE STANDARD (DSS) |
IEC 61850-7-3:2010
|
Communication networks and systems for power utility automation - Part 7-3: Basic communication structure - Common data classes |
ISO/IEC 15408-1:2009
|
Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
ISO/IEC Guide 2:2004
|
Standardization and related activities General vocabulary |
IEC 61850-10:2012
|
Communication networks and systems for power utility automation - Part 10: Conformance testing |
ISA 99 CD : 2010
|
SECURITY GUIDELINES AND USER RESOURCES FOR INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 13335-1:2004
|
Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management |
ISO/IEC 11770-1:2010
|
Information technology Security techniques Key management Part 1: Framework |
FIPS PUB 180 : 2002
|
SECURE HASH STANDARD |
ISA 5.1 : 1984
|
INSTRUMENTATION SYMBOLS AND IDENTIFICATION |
IEC TR 60870-1-3:1997
|
Telecontrol equipment and systems - Part 1: General considerations - Section 3: Glossary |
ISO/IEC 18028-3:2005
|
Information technology Security techniques IT network security Part 3: Securing communications between networks using security gateways |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |