ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 25538 | ISO/IEC WD 11770-4 | Information technology — Security techniques — Key management — Part 4: Cryptographic separation | Izstrādē |
| 28283 | ISO/IEC WD 14516-2 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 2: Technical aspects | Izstrādē |
| 66776 | ISO/IEC NP 19974 | Competence requirements for information security testers and evaluators | Izstrādē |
| 67001 | ISO/IEC NP 20085 | Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 41312 | ISO/IEC NP 13335-5 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Izstrādē |
| 38738 | ISO/IEC 15408-1:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model — Technical Corrigendum 1 | Izstrādē |
| 80397 | ISO/IEC NP TS 27564 | Privacy — Guidance on the use of models for engineering | Izstrādē |
| 61008 | ISO/IEC CD TR 27029 | additional document for ISO/IEC 27002 and ISO and IEC standards | Izstrādē |
Displaying 21-30 of 793 results.
