ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
| 89523 | ISO/IEC CD 19989-1 | Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework | Izstrādē |
| 33930 | ISO/IEC CD 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
| 90714 | ISO/IEC CD 19086-4 | Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 94238 | ISO/IEC AWI TS 27115-3 | Information security, cybersecurity and privacy protection — Cybersecurity of system of systems — Part 3: Security profiles | Izstrādē |
| 94237 | ISO/IEC AWI TS 27115-2 | Information security, cybersecurity and privacy protection — Cybersecurity of system of systems — Part 2: Security architecture evaluation | Izstrādē |
| 94236 | ISO/IEC AWI TS 27115-1 | Information security, cybersecurity and privacy protection — Cybersecurity of system of systems — Part 1: Security architecture description | Izstrādē |
Displaying 301-310 of 807 results.
