ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 84248 | ISO/IEC 24760-1:2019/Amd 1:2023 | IT Security and Privacy — A framework for identity management — Part 1: Terminology and concepts — Amendment 1 | Atcelts |
| 84247 | ISO/IEC TS 20540:2025 | Information security, cybersecurity and privacy protection — Testing cryptographic modules in their field | Standarts spēkā |
| 84246 | ISO/IEC PWI 13042 | Consideration of the Security Model for Mechanism 7a in ISO/IEC 9798-6 | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
| 83534 | ISO/IEC TS 9569:2023 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045 | Standarts spēkā |
| 83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
| 82933 | ISO/IEC 29146:2016/Amd 1:2022 | Information technology — Security techniques — A framework for access management — Amendment 1 | Atcelts |
Displaying 191-200 of 807 results.
