ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
85938 | ISO/IEC 29100:2024 | Information technology — Security techniques — Privacy framework | Standarts spēkā |
85936 | ISO/IEC PWI 19562 | Investigation of the feasibility and implementation of changes to ISO/IEC 15408 and ISO/IEC 18045 | Izstrādē |
85935 | ISO/IEC 18014-1:2008/Amd 1:2025 | Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1 | Standarts spēkā |
85929 | ISO/IEC 11770-3:2021/Amd 1:2025 | Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement | Standarts spēkā |
85923 | ISO/IEC PWI 19541 | Inclusion of key encapsulation mechanisms for Post-Quantum Cryptography in ISO/IEC standards | Izstrādē |
85922 | ISO/IEC 27013:2021/Amd 1:2024 | Information security, cybersecurity and privacy protection — Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 — Amendment 1 | Standarts spēkā |
85920 | ISO/IEC CD 27004 | Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation | Izstrādē |
85919 | ISO/IEC CD 27003 | Information technology — Security techniques — Information security management systems — Guidance | Izstrādē |
85851 | ISO/IEC CD 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
85850 | ISO/IEC CD 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
Displaying 131-140 of 774 results.