ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
84999 | ISO/IEC PWI 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
85008 | ISO/IEC PWI 6109 | Guidelines for data security monitoring based on logging | Izstrādē |
84249 | ISO/IEC 29134:2017/DAmd 1 | Information technology — Security techniques — Guidelines for privacy impact assessment — Amendment 1 | Izstrādē |
41309 | ISO/IEC WD 13335-2 | IT security techniques — Management of information and communications technology security — Part 2: Information security risk management | Izstrādē |
70631 | ISO/IEC 14888-3:2016/DAmd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism | Izstrādē |
23706 | ISO/IEC WD 14516-1 | Guidelines for the use and management of Trusted Third Party (TTP) services — Part 1: General overview | Izstrādē |
19685 | ISO/IEC WD 11768-3 | Information technology security techniques — Evaluation criteria for information technology security — Part 3: Assurance of IT systems | Izstrādē |
19682 | ISO/IEC WD 11765 | Security information objects | Izstrādē |
39813 | ISO/IEC DIS 20886 | Information technology — International Security, Trust, and Privacy Alliance — Privacy Framework | Izstrādē |
45154 | ISO/IEC NP 29131 | Verification of cryptographic protocols | Izstrādē |
Displaying 731-740 of 770 results.