ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 64139 | ISO/IEC NP 19248 | Information technology — Security techniques — Requirements for certification of information security management professionals | Izstrādē |
| 92947 | ISO/IEC PWI 26246 | Security guidelines for implementation of code generation tools and techniques | Izstrādē |
| 92017 | ISO/IEC AWI 14888-5 | Information security — Digital signatures with appendix — Part 5: Lattice-based mechanisms | Izstrādē |
| 75948 | ISO/IEC NP TS 23532-2 | IT Security Techniques — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Part 1: Testing and evaluation for ISO/IEC 15408Part 2: Testing for ISO/IEC 19790 | Izstrādē |
| 92946 | ISO/IEC AWI 30111 | Cybersecurity — Vulnerability handling and disclosure processes | Izstrādē |
| 90716 | ISO/IEC PWI 25548 | Cybersecurity framework for smart cities | Izstrādē |
| 62070 | ISO/IEC 18031:2005/NP Amd 1 | Information technology — Security techniques — Random bit generation — Amendment 1 | Izstrādē |
| 82881 | ISO/IEC PWI TR 7677 | Roadmap for the maintenance of ISO/IEC 15408 and ISO/IEC 18045. (WG3 N2083) | Izstrādē |
| 76152 | ISO/IEC PWI 27031 | Information technology Security techniques Guidelines for information and communication technology readiness for business continuity | Izstrādē |
| 71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
Displaying 191-200 of 791 results.
