ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 94004 | ISO/IEC PWI 26601 | Guidance on addressing cybersecurity of Systems-of-Systems | Izstrādē |
| 83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
| 89721 | ISO/IEC PWI 25281 | Inclusion of further attribute-based credential schemes in SC27/WG2 standards | Izstrādē |
| 94003 | ISO/IEC PWI 26599 | Security guidance on interference service based on LLMs | Izstrādē |
| 84257 | ISO/IEC FDIS 27000 | Information security, cybersecurity and privacy protection — Information security management systems — Overview | Izstrādē |
| 89524 | ISO/IEC PWI TS 27569 | Personal identifiable information (PII) processing record information structure | Izstrādē |
| 89514 | ISO/IEC PWI 25235 | Updating SC 27 Committee Document 205 in ISO/IEC JTC 1/SC 27 | Izstrādē |
| 85850 | ISO/IEC FDIS 29128-2 | Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols | Izstrādē |
| 36359 | ISO/IEC WD 17799 | Information technology — Code of practice for information security management | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
Displaying 771-780 of 807 results.
