ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
84991 | ISO/IEC PWI 17618 | Management of digital evidence using verifiable and trustable technology | Izstrādē |
83197 | ISO/IEC PWI 29128-3 | Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
82881 | ISO/IEC PWI TR 7677 | Roadmap for the maintenance of ISO/IEC 15408 and ISO/IEC 18045. (WG3 N2083) | Izstrādē |
85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
84986 | ISO/IEC PWI 4922-3 | Secure multiparty computation — Part 3: Mechanisms based on garbled circuit | Izstrādē |
71518 | ISO/IEC 24760-1:2011/FDAmd 1 | Information technology — Security techniques — A framework for identity management — Part 1: Terminology and concepts — Amendment 1: Additional terminology and concepts | Izstrādē |
85009 | ISO/IEC WD 24760-4 | IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication | Izstrādē |
26157 | ISO/IEC DIS 14980 | Information technology — Code of practice for information security management | Izstrādē |
84753 | ISO/IEC FDIS 19792 | Information security, cybersecurity and privacy protection — General principles, requirements and guidance for security evaluation of biometric systems | Izstrādē |
Displaying 711-720 of 770 results.