ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
71518 | ISO/IEC 24760-1:2011/FDAmd 1 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts — Amendment 1: Additional terminology and concepts | Izstrādē |
71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
71291 | ISO/IEC CD 9798-5 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Izstrādē |
71290 | ISO/IEC NP 18032 | Information technology Security techniques Prime number generation | Izstrādē |
71278 | ISO/IEC 20547-4:2020 | Information technology — Big data reference architecture — Part 4: Security and privacy | Atcelts |
71165 | ISO/IEC 11770-3:2015/Cor 1:2016 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Technical Corrigendum 1 | Atcelts |
71163 | ISO/IEC 24761:2019 | Information technology — Security techniques — Authentication context for biometrics | Standarts spēkā |
71122 | ISO/IEC 19896-3:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 3: Knowledge, skills and effectiveness requirements for ISO/IEC 15408 evaluators | Standarts spēkā |
71121 | ISO/IEC 19896-2:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 2: Knowledge, skills and effectiveness requirements for ISO/IEC 19790 testers | Standarts spēkā |
71120 | ISO/IEC 19896-1:2018 | IT security techniques — Competence requirements for information security testers and evaluators — Part 1: Introduction, concepts and general requirements | Standarts spēkā |
Displaying 291-300 of 774 results.