ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 68837 | ISO/IEC TR 20004:2015 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 | Standarts spēkā |
| 68530 | ISO/IEC 24759:2014/Cor 1:2015 | Information technology — Security techniques — Test requirements for cryptographic modules — Technical Corrigendum 1 | Atcelts |
| 68529 | ISO/IEC 19790:2012/Cor 1:2015 | Information technology — Security techniques — Security requirements for cryptographic modules — Technical Corrigendum 1 | Atcelts |
| 68427 | ISO/IEC 27010:2015 | Information technology — Security techniques — Information security management for inter-sector and inter-organizational communications | Atcelts |
| 68296 | ISO/IEC 20543:2019 | Information technology — Security techniques — Test and analysis methods for random bit generators within ISO/IEC 19790 and ISO/IEC 15408 | Standarts spēkā |
| 68294 | ISO/IEC TS 20540:2018 | Information technology — Security techniques — Testing cryptographic modules in their operational environment | Atcelts |
| 68242 | ISO/IEC 19086-4:2019 | Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII | Standarts spēkā |
| 68231 | ISO/IEC 14888-2:2008/Cor 1:2015 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 | Standarts spēkā |
| 68091 | ISO/IEC 27019:2017 | Information technology — Security techniques — Information security controls for the energy utility industry | Atcelts |
| 67933 | ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Standarts spēkā |
Displaying 351-360 of 807 results.
