ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
51624 | ISO/IEC WD 24745 | Information technology — Biometric template protection | Izstrādē |
51617 | ISO/IEC 9798-2:1999/NP Amd 1 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Amendment 1 | Izstrādē |
44380 | ISO/IEC NP 27036 | Information technology — Security techniques — Guidelines for security of outsourcing | Izstrādē |
38853 | ISO/IEC FCD 24743 | Information technology — Security techniques — Information security management systems requirements specification | Izstrādē |
52907 | ISO/IEC NP TR 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
72401 | ISO/IEC CD 20009-3 | Information technology — Security techniques — Anonymous entity authentication — Part 3: Mechanisms based on blind signatures concepts | Izstrādē |
36359 | ISO/IEC WD 17799 | Information technology — Code of practice for information security management | Izstrādē |
43758 | ISO/IEC NP 27018 | Information technology — Security techniques — Detailing software penetration testing under ISO/IEC 15408 and ISO/IEC 18045 vulnerability analysis | Izstrādē |
51625 | ISO/IEC CD 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
Displaying 561-570 of 770 results.