ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 88141 | ISO/IEC FDIS 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
| 38855 | ISO/IEC NP 24745 | Information technology — Biometric template protection | Izstrādē |
| 88130 | ISO/IEC DIS 11770-4 | Information security — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
| 89516 | ISO/IEC CD 9798-5 | Information security — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Izstrādē |
| 64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
| 88138 | ISO/IEC FDIS 15408-4 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Izstrādē |
| 89523 | ISO/IEC WD 19989-1.3 | Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework | Izstrādē |
| 88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
| 88142 | ISO/IEC PWI 6087 | Digital authentication: Risks and mitigations | Izstrādē |
| 55578 | ISO/IEC NP 15443-2 | Information technology — Security techniques — A framework for IT security assurance — Part 2: Assurance methods | Izstrādē |
Displaying 711-720 of 791 results.
