ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 64215 | ISO/IEC 15408-1:2009/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1 | Izstrādē |
| 28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
| 38852 | ISO/IEC NP 24742 | Information technology — Information security management metrics and measurements | Izstrādē |
| 60030 | ISO/IEC NP 17548 | Information technology — Security techniques — Guidance on assuring suitability and adequacy of investigation methods | Izstrādē |
| 43758 | ISO/IEC NP 27018 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
| 55578 | ISO/IEC NP 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
| 89722 | ISO/IEC PWI 25282 | Oblivious Transfer Extensions | Izstrādē |
| 89721 | ISO/IEC PWI 25281 | Inclusion of further attribute-based credential schemes in SC27/WG2 standards | Izstrādē |
Displaying 141-150 of 807 results.
