ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
| 82882 | ISO/IEC PWI 7680 | Requirements for the competence of ICT products cybersecurity conformity assessment body personnel – Knowledge, skills and effectiveness for ISO/IEC 15408 and ISO/IEC 19790 validators | Izstrādē |
| 31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
| 64215 | ISO/IEC 15408-1:2009/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1 | Izstrādē |
| 88125 | ISO/IEC PWI 24841 | Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
| 64216 | ISO/IEC 18045:2008/CD Cor 1 | Information technology — Security techniques — Methodology for IT security evaluation — Technical Corrigendum 1 | Izstrādē |
| 38853 | ISO/IEC FCD 24743 | Information technology — Security techniques — Information security management systems requirements specification | Izstrādē |
| 70631 | ISO/IEC 14888-3:2016/DAmd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism | Izstrādē |
| 94237 | ISO/IEC AWI TS 27115-2 | Information security, cybersecurity and privacy protection — Cybersecurity of system of systems — Part 2: Security architecture evaluation | Izstrādē |
| 94270 | ISO/IEC AWI 27014 | Information security, cybersecurity and privacy protection — Governance of information security | Izstrādē |
Displaying 251-260 of 807 results.
