ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 85850 | ISO/IEC DIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Aptauja slēgta |
| 85851 | ISO/IEC DIS 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verification | Aptauja |
| 87557 | ISO/IEC DIS 4922-3 | Information security — Secure multiparty computation — Part 3: Mechanisms based on garbled circuits | Izstrādē |
| 87375 | ISO/IEC DTS 5689 | Cybersecurity — Security frameworks and use cases for cyber physical systems | Izstrādē |
| 38853 | ISO/IEC FCD 24743 | Information technology — Security techniques — Information security management systems requirements specification | Izstrādē |
| 31389 | ISO/IEC FCD 9796-1 | Information technology — Security techniques — Digital signature scheme giving message recovery — Part 1: Mechanisms using redundancy | Izstrādē |
| 88135 | ISO/IEC FDIS 15408-2 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components | Izstrādē |
| 88136 | ISO/IEC FDIS 15408-3 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Izstrādē |
| 84257 | ISO/IEC FDIS 27000 | Information security, cybersecurity and privacy protection — Information security management systems — Overview | Izstrādē |
| 82878 | ISO/IEC FDIS 27017 | Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services | Izstrādē |
Displaying 531-540 of 793 results.
