ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 68838 | ISO/IEC NP TR 20004-2 | Information technology — Security techniques — Refining software vulnerability analysis under ISO/IEC 15408 and ISO/IEC 18045 — Part 2: CWE and CAPEC based software penetration testing | Izstrādē |
| 66670 | ISO/IEC NP TS 14516-1 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 1: Overview and concepts | Izstrādē |
| 66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
| 66672 | ISO/IEC NP TS 14516-3 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 3: Guidelines on information security for PKI trust service providers | Izstrādē |
| 75948 | ISO/IEC NP TS 23532-2 | IT Security Techniques — Requirements for the competence of IT security testing and evaluation laboratories — Part 2: Part 1: Testing and evaluation for ISO/IEC 15408Part 2: Testing for ISO/IEC 19790 | Izstrādē |
| 80397 | ISO/IEC NP TS 27564 | Privacy — Guidance on the use of models for engineering | Izstrādē |
| 45272 | ISO/IEC PDTR 29193 | Secure system design principles and techniques | Izstrādē |
| 62072 | ISO/IEC PDTS 27035-3 | Information technology — Security techniques — Information security incident management — Part 3: Guidelines for incident response operations | Standarts spēkā |
| 84244 | ISO/IEC PWI 13025 | Inclusion of arithmetization-friendly cryptographic algorithms in ISO/IEC standards | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
Displaying 581-590 of 791 results.
