ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
40614 | ISO/IEC 15408-3:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 3: Security assurance requirements | Atcelts |
40612 | ISO/IEC 15408-1:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model | Atcelts |
29580 | ISO/IEC TR 15947:2002 | Information technology Security techniques IT intrusion detection framework | Atcelts |
59144 | ISO/IEC 27006:2011 | Information technology Security techniques Requirements for bodies providing audit and certification of information security management systems | Atcelts |
84257 | ISO/IEC DIS 27000 | Information security, cybersecurity and privacy protection — Information security management systems — Overview | Aptauja |
86889 | ISO/IEC 29192-1:2012/DAmd 1 | Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1 | Aptauja |
61007 | ISO/IEC DIS 27028 | Information security, cyber security and privacy protection — Guidance on ISO/IEC 27002 attributes | Aptauja |
87641 | ISO/IEC DIS 28033-4 | Information Security - Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Aptauja |
88138 | ISO/IEC DIS 15408-4 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Aptauja slēgta |
80398 | ISO/IEC DIS 27565.2 | Information security, cybersecurity and privacy protection — Guidelines on privacy preservation based on zero-knowledge proofs | Aptauja slēgta |
Displaying 531-540 of 774 results.