ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
| 90702 | ISO/IEC PWI 25540 | Development of a design specification for the revision of ISO/IEC 27007 | Izstrādē |
| 89513 | ISO/IEC PWI 25234 | New Lightweight Asymmetric Cryptographic Techniques | Izstrādē |
| 19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
| 63151 | ISO/IEC 9796-3:2006/CD Cor 1 | Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Izstrādē |
| 61008 | ISO/IEC CD TR 27029 | additional document for ISO/IEC 27002 and ISO and IEC standards | Izstrādē |
| 26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
| 63074 | ISO/IEC NP 18628 | The Use and Application of ISO/IEC 27001 for Sector/Service-Specific Third-Party Accredited Certifications | Izstrādē |
| 55577 | ISO/IEC NP 15443-1 | Information technology — Security techniques — A framework for IT security assurance — Part 1: Overview and framework | Izstrādē |
| 71518 | ISO/IEC 24760-1:2011/FDAmd 1 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts — Amendment 1: Additional terminology and concepts | Izstrādē |
Displaying 621-630 of 807 results.
