ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
63411 | ISO/IEC 27000:2014 | Information technology Security techniques Information security management systems Overview and vocabulary | Atcelts |
63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
63081 | ISO/IEC 27050-1:2016 | Information technology — Security techniques — Electronic discovery — Part 1: Overview and concepts | Atcelts |
63074 | ISO/IEC NP 18628 | The Use and Application of ISO/IEC 27001 for Sector/Service-Specific Third-Party Accredited Certifications | Izstrādē |
62726 | ISO/IEC 29151:2017 | Information technology — Security techniques — Code of practice for personally identifiable information protection | Standarts spēkā |
62548 | ISO/IEC NP 27036-5 | Information technology — Security techniques — Information security for supplier relationships — Part 5: Guidelines for security of cloud services | Izstrādē |
62544 | ISO/IEC 18370-2:2016 | Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms | Standarts spēkā |
62543 | ISO/IEC 10118-4:1998/Amd 1:2014 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers | Standarts spēkā |
62404 | ISO/IEC 24761:2009/Cor 1:2013 | Information technology — Security techniques — Authentication context for biometrics — Technical Corrigendum 1 | Atcelts |
62399 | ISO/IEC 9798-2:2008/Cor 3:2013 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3 | Atcelts |
Displaying 381-390 of 774 results.