ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 21136 | ISO/IEC CD 11768-2 | Information technology security techniques — Evaluation criteria for information technology security — Part 2: Functionality of IT systems, products and components | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 90714 | ISO/IEC CD 19086-4 | Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII | Izstrādē |
| 33930 | ISO/IEC CD 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
| 89523 | ISO/IEC CD 19989-1 | Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework | Izstrādē |
| 72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
| 78813 | ISO/IEC CD 20009-3 | Information security — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures | Standarts spēkā |
| 51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
| 91716 | ISO/IEC CD 25330-2.2 | Information security — Oblivious transfer — Part 2: Base oblivious transfer protocols | Izstrādē |
Displaying 501-510 of 807 results.
