ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88138 | ISO/IEC DIS 15408-4 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Aptauja slēgta |
56581 | ISO/IEC DIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats to artificial intelligence systems | Aptauja slēgta |
86890 | ISO/IEC 18033-2:2006/DAmd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Aptauja slēgta |
88151 | ISO/IEC DIS 29151.2 | Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection | Aptauja slēgta |
82878 | ISO/IEC DIS 27017 | Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services | Aptauja slēgta |
80398 | ISO/IEC DIS 27565.2 | Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs | Aptauja slēgta |
87641 | ISO/IEC DIS 28033-4 | Information Security - Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Aptauja |
84257 | ISO/IEC DIS 27000 | Information security, cybersecurity and privacy protection — Information security management systems — Overview | Aptauja |
61007 | ISO/IEC DIS 27028 | Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes | Aptauja |
86889 | ISO/IEC 29192-1:2012/DAmd 1 | Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1 | Aptauja |
Displaying 231-240 of 774 results.