ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
38853 | ISO/IEC FCD 24743 | Information technology — Security techniques — Information security management systems requirements specification | Izstrādē |
87375 | ISO/IEC DTS 5689 | Cybersecurity — Security frameworks and use cases for cyber physical systems | Izstrādē |
89319 | ISO/IEC DTS 27564 | Privacy protection — Guidance on the use of models for privacy engineering | Izstrādē |
88151 | ISO/IEC DIS 29151.2 | Information security, cybersecurity and privacy protection – Controls and guidance for personally identifiable information protection | Aptauja slēgta |
87641 | ISO/IEC DIS 28033-4 | Information Security - Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Aptauja |
87638 | ISO/IEC DIS 28033-1 | Information security — Fully homomorphic encryption — Part 1: General | Izstrādē |
80398 | ISO/IEC DIS 27565.2 | Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs | Aptauja slēgta |
56581 | ISO/IEC DIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats to artificial intelligence systems | Aptauja slēgta |
Displaying 251-260 of 774 results.