ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
| 17887 | ISO/IEC 9979:1991 | Data cryptographic techniques — Procedures for the registration of cryptographic algorithms | Atcelts |
| 17663 | ISO/IEC 9798-3:1993 | Information technology — Security techniques — Entity authentication mechanisms — Part 3: Entity authentication using a public key algorithm | Atcelts |
| 77722 | ISO/IEC 27006:2015/Amd 1:2020 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems — Amendment 1 | Atcelts |
| 42505 | ISO/IEC 27006:2007 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 35394 | ISO/IEC 18043:2006 | Information technology — Security techniques — Selection, deployment and operations of intrusion detection systems | Atcelts |
| 19687 | ISO/IEC 11770-1:1996 | Information technology — Security techniques — Key management — Part 1: Framework | Atcelts |
| 29580 | ISO/IEC TR 15947:2002 | Information technology — Security techniques — IT intrusion detection framework | Atcelts |
| 61498 | ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
| 34387 | ISO/IEC 18014-2:2002 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
Displaying 351-360 of 791 results.
