ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 23706 | ISO/IEC WD 14516-1 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overview | Izstrādē |
| 83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
| 82877 | ISO/IEC PWI 27009 | Information security, cybersecurity and privacy protection — Sector-specific application of ISO/IEC 27001 — Requirements | Izstrādē |
| 38739 | ISO/IEC 15408-2:1999/CD Cor 1 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements — Technical Corrigendum 1 | Izstrādē |
| 52909 | ISO/IEC NP TR 15443-3 | Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methods | Izstrādē |
| 73908 | ISO/IEC NP 20008-2 | Information technology Security techniques Anonymous digital signatures | Izstrādē |
| 71525 | ISO/IEC DIS 10118-2 | Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher | Izstrādē |
| 43752 | ISO/IEC WD 27012 | Information technology - Security techniques — ISM guidelines for e-government services | Izstrādē |
| 66801 | ISO/IEC NP 19989 | Information technology — Security techniques — Criteria and methodology for security evaluation of biometric systems | Izstrādē |
| 71903 | ISO/IEC 29115:2013/DAmd 1 | Information technology — Security techniques — Entity authentication assurance framework — Amendment 1 | Izstrādē |
Displaying 611-620 of 791 results.
