ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
30818 | ISO/IEC WD 18033 | Information technology — Encryption algorithms | Izstrādē |
71518 | ISO/IEC 24760-1:2011/FDAmd 1 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts — Amendment 1: Additional terminology and concepts | Izstrādē |
44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
27686 | ISO/IEC WD 15443 | Information technology - Security techniques - A framework for IT security assurance | Izstrādē |
51624 | ISO/IEC WD 24745 | Information technology — Biometric template protection | Izstrādē |
43758 | ISO/IEC NP 27018 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
91773 | ISO/IEC PWI 25863 | Exploration of digital wallets storing digital credentials | Izstrādē |
27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
87375 | ISO/IEC AWI TS 5689 | Cybersecurity – Security frameworks and use cases for cyber physical systems | Izstrādē |
Displaying 201-210 of 770 results.