IEEE/ISO/IEC 15026-1-2014
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
IEEE Standard Adoption of ISO/IEC 15026-1--Systems and Software Engineering--Systems and Software Assurance--Part 1: Concepts and Vocabulary
18-11-2014
English
04-11-2014
Foreword
Introduction
1 Scope
2 Applicability
3 Terms and definitions
4 Organization of this International Standard
5 Basic concepts
6 Using multiple parts of ISO/IEC 150269
7 ISO/IEC 15026 and the assurance case
8 ISO/IEC 15026 and integrity levels
9 ISO/IEC 15026 and the life cycle
10 Summary
Bibliography
Describes assurance-related terms and specifies an organized set of concepts and relationships to establish a basis for shared understanding across user communities for assurance.
Committee |
Software & Systems Engineering Standards Comm
|
DocumentType |
Standard
|
Pages |
45
|
PublisherName |
Institute of Electrical & Electronics Engineers
|
Status |
Superseded
|
SupersededBy | |
Supersedes |
Standards | Relationship |
ISO/IEC 15026-1:2013 | Identical |
PD ISO/IEC TR 19759:2016 | Software Engineering. Guide to the software engineering body of knowledge (SWEBOK) |
IEEE/ISO/IEC 15026-4-2021 | ISO/IEC/IEEE International Standard - Systems and software engineering--Systems and software assurance -- Part 4: Assurance in the life cycle |
ISO/IEC TR 19759:2015 | Software Engineering — Guide to the software engineering body of knowledge (SWEBOK) |
IEC 61025:2006 | Fault tree analysis (FTA) |
ISO/IEC 26702:2007 | Systems engineering — Application and management of the systems engineering process |
ISO 9241-400:2007 | Ergonomics of humansystem interaction Part 400: Principles and requirements for physical input devices |
ISO/IEC/IEEE 16326:2009 | Systems and software engineering Life cycle processes Project management |
ISO/IEC TR 24748-1:2010 | Systems and software engineering Life cycle management Part 1: Guide for life cycle management |
ISO/IEC 15408-2:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional components |
ISO/IEC 18014-3:2009 | Information technology Security techniques Time-stamping services Part 3: Mechanisms producing linked tokens |
ISO 14625:2007 | Space systems — Ground support equipment for use at launch, landing or retrieval sites — General requirements |
ISO/TR 27809:2007 | Health informatics Measures for ensuring patient safety of health software |
ISO/IEC 27001:2013 | Information technology — Security techniques — Information security management systems — Requirements |
ISO/IEC TR 15443-1:2012 | Information technology Security techniques Security assurance framework Part 1: Introduction and concepts |
ISO/IEC 25020:2007 | Software engineering Software product Quality Requirements and Evaluation (SQuaRE) Measurement reference model and guide |
ISO/IEC 25010:2011 | Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — System and software quality models |
CAA CAP 760 : 2006 AMD 1 2010 | GUIDANCE ON THE CONDUCT OF HAZARD IDENTIFICATION, RISK ASSESSMENT AND THE PRODUCTION OF SAFETY CASES: FOR AERODROME OPERATORS AND AIR TRAFFIC SERVICE PROVIDERS |
IEC 60812:2006 | Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA) |
ISO/IEC 27004:2016 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation |
DEFSTAN 00-56(PT2)/4(2007) : 2007 | SAFETY MANAGEMENT REQUIREMENTS FOR DEFENCE SYSTEMS - PART 2: GUIDANCE ON ESTABLISHING A MEANS OF COMPLYING WITH PART 1 |
ISO/IEC 15408-3:2008 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance components |
ISO/PAS 20282-4:2007 | Ease of operation of everyday products Part 4: Test method for the installation of consumer products |
ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems |
ISO 2394:2015 | General principles on reliability for structures |
ISO/IEC 25051:2014 | Software engineering Systems and software Quality Requirements and Evaluation (SQuaRE) Requirements for quality of Ready to Use Software Product (RUSP) and instructions for testing |
ISO/TR 18529:2000 | Ergonomics Ergonomics of human-system interaction Human-centred lifecycle process descriptions |
ISO/IEC 25040:2011 | Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Evaluation process |
ISO/IEC 25000:2014 | Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE) — Guide to SQuaRE |
ISO/IEC 18014-2:2009 | Information technology Security techniques Time-stamping services Part 2: Mechanisms producing independent tokens |
IEC 61078:2016 | Reliability block diagrams |
ISO/IEC 19770-2:2015 | Information technology IT asset management Part 2: Software identification tag |
ISO/IEC 27002:2013 | Information technology Security techniques Code of practice for information security controls |
ISO 28003:2007 | Security management systems for the supply chain Requirements for bodies providing audit and certification of supply chain security management systems |
ISO 12100:2010 | Safety of machinery — General principles for design — Risk assessment and risk reduction |
ISO/IEC 25012:2008 | Software engineering — Software product Quality Requirements and Evaluation (SQuaRE) — Data quality model |
ISO 14620-3:2005 | Space systems Safety requirements Part 3: Flight safety systems |
ISO/IEC 21827:2008 | Information technology — Security techniques — Systems Security Engineering — Capability Maturity Model® (SSE-CMM®) |
ISO/IEC 19770-1:2012 | Information technology Software asset management Part 1: Processes and tiered assessment of conformance |
ISO/IEC 15288:2008 | Systems and software engineering — System life cycle processes |
DEFSTAN 00-42(PT3)/4(2011) : 2011 | RELIABILITY AND MAINTAINABILITY ASSURANCE GUIDE - PART 3: R&M CASE |
ISO/IEC/IEEE 42010:2011 | Systems and software engineering — Architecture description |
IEC 60300-3-2:2004 | Dependability management - Part 3-2: Application guide - Collection of dependability data from the field |
ISO/IEC 27011:2016 | Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations |
ISO/IEC TR 19791:2010 | Information technology Security techniques Security assessment of operational systems |
ISO/IEC 16085:2006 | Systems and software engineering — Life cycle processes — Risk management |
ISO/IEC 27005:2011 | Information technology Security techniques Information security risk management |
ISO/IEC 12207:2008 | Systems and software engineering — Software life cycle processes |
ISO 13849-2:2012 | Safety of machinery — Safety-related parts of control systems — Part 2: Validation |
ISO 14620-1:2002 | Space systems Safety requirements Part 1: System safety |
ISO/TS 20282-2:2013 | Usability of consumer products and products for public use — Part 2: Summative test method |
ISO/IEC TR 15446:2017 | Information technology Security techniques Guidance for the production of protection profiles and security targets |
ISO/IEC 15408-1:2009 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model |
DEFSTAN 00-55(PT2)/2(1997) : 1997 ERRATUM 1997 | REQUIREMENTS FOR SAFETY RELATED SOFTWARE IN DEFENCE EQUIPMENT - PART 2: GUIDANCE |
ISO/IEC 2382-14:1997 | Information technology Vocabulary Part 14: Reliability, maintainability and availability |
ISO 19706:2011 | Guidelines for assessing the fire threat to people |
DEFSTAN 00-55(PT1)/2(1997) : 1997 | REQUIREMENTS FOR SAFETY RELATED SOFTWARE IN DEFENCE EQUIPMENT - PART 1: REQUIREMENTS |
IEC 60300-3-15:2009 | Dependability management - Part 3-15: Application guide - Engineering of system dependability |
IEC 60300:1984 | Reliability and maintainability management |
ISO/IEC 90003:2014 | Software engineering Guidelines for the application of ISO 9001:2008 to computer software |
ISO/IEC TR 15443-2:2012 | Information technology Security techniques Security assurance framework Part 2: Analysis |
IEC 61508-7:2010 | Functional safety of electrical/electronic/programmable electronic safety-related systems - Part 7: Overview of techniques and measures (see Functional Safety and IEC 61508) |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
ISO 20282-1:2006 | Ease of operation of everyday products Part 1: Design requirements for context of use and user characteristics |
SAE JA 1000 : 2012 | RELIABILITY PROGRAM STANDARD |
ISO/IEC 25030:2007 | Software engineering Software product Quality Requirements and Evaluation (SQuaRE) Quality requirements |
ISO 13849-1:2015 | Safety of machinery — Safety-related parts of control systems — Part 1: General principles for design |
DEFSTAN 00-56(PT1)/4(2007) : 2007 | SAFETY MANAGEMENT REQUIREMENTS FOR DEFENCE SYSTEMS - PART 1: REQUIREMENTS |
ISO 14620-2:2011 | Space systems Safety requirements Part 2: Launch site operations |
ISO/TS 25238:2007 | Health informatics Classification of safety risks from health software |
ISO/IEC 18014-1:2008 | Information technology Security techniques Time-stamping services Part 1: Framework |
CAA CAP 670 : 2013 + A1 2014 | ATS SAFETY REQUIREMENTS |
ISO/TR 16982:2002 | Ergonomics of human-system interaction Usability methods supporting human-centred design |
ISO/IEC 15939:2007 | Systems and software engineering Measurement process |
ISO/PAS 20282-3:2007 | Ease of operation of everyday products Part 3: Test method for consumer products |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.