ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
62288 | ISO/IEC 18370-1:2016 | Information technology — Security techniques — Blind digital signatures — Part 1: General | Standarts spēkā |
62287 | ISO/IEC WD 27044 | Guidelines for Security Information and Event Management (SIEM) | Standarts spēkā |
62286 | ISO/IEC 18367:2016 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing | Standarts spēkā |
62073 | ISO/IEC 18033-3:2010/NP Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1 | Izstrādē |
62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
62071 | ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response | Atcelts |
62070 | ISO/IEC 18031:2005/NP Amd 1 | Information technology — Security techniques — Random bit generation — Amendment 1 | Izstrādē |
61498 | ISO/IEC 27018:2014 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
61263 | ISO/IEC 13888-2:2010/Cor 1:2012 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques — Technical Corrigendum 1 | Standarts spēkā |
61191 | ISO/IEC 9798-4:1999/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2 | Standarts spēkā |
Displaying 391-400 of 770 results.