ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 30830 | ISO/IEC 18045:2005 | Information technology — Security techniques — Methodology for IT security evaluation | Atcelts |
| 44884 | ISO/IEC 10118-2:2000/Cor 1:2006 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1 | Atcelts |
| 76559 | ISO/IEC 27018:2019 | Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors | Atcelts |
| 72437 | ISO/IEC TR 27103:2018 | Information technology — Security techniques — Cybersecurity and ISO and IEC Standards | Atcelts |
| 45269 | ISO/IEC 29190:2015 | Information technology — Security techniques — Privacy capability assessment model | Atcelts |
| 62313 | ISO/IEC 27006:2015 | Information technology — Security techniques — Requirements for bodies providing audit and certification of information security management systems | Atcelts |
| 50457 | ISO/IEC 18014-3:2009 | Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens | Atcelts |
| 66558 | ISO/IEC 18031:2011/Cor 1:2014 | Information technology — Security techniques — Random bit generation — Technical Corrigendum 1 | Atcelts |
| 23230 | ISO/IEC 13888-2:1998 | Information technology — Security techniques — Non-repudiation — Part 2: Mechanisms using symmetric techniques | Atcelts |
| 72917 | ISO/IEC 15408-5:2022 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Atcelts |
Displaying 501-510 of 807 results.
