ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
83534 | ISO/IEC TS 9569:2023 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045 | Standarts spēkā |
83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
82933 | ISO/IEC 29146:2016/Amd 1:2022 | Information technology — Security techniques — A framework for access management — Amendment 1 | Atcelts |
82908 | ISO/IEC 27006-1:2024 | Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of information security management systems — Part 1: General | Standarts spēkā |
82905 | ISO/IEC 27036-1:2021 | Cybersecurity — Supplier relationships — Part 1: Overview and concepts | Standarts spēkā |
82894 | ISO/IEC 27706 | Information security, cybersecurity and privacy protection — Requirements for bodies providing audit and certification of privacy information management systems | Izstrādē |
Displaying 161-170 of 774 results.