ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
| 33930 | ISO/IEC CD 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
| 90714 | ISO/IEC CD 19086-4 | Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 93042 | ISO/IEC AWI TR 27109 | Cybersecurity education and training | Izstrādē |
| 61006 | ISO/IEC AWI TR 27024 | Information security, cybersecurity and privacy protection — Government and regulatory use of ISO/IEC 27001, ISO/IEC 27002 and other information security standards | Izstrādē |
| 92946 | ISO/IEC AWI 30111 | Cybersecurity — Vulnerability handling and disclosure processes | Izstrādē |
| 92945 | ISO/IEC AWI 29147 | Cybersecurity — Vulnerability disclosure processes | Izstrādē |
Displaying 301-310 of 791 results.
