ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
88142 | ISO/IEC PWI 6087 | Digital authentication: Risks and mitigations | Izstrādē |
88141 | ISO/IEC DIS 18045 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation | Izstrādē |
88140 | ISO/IEC FDIS 15408-5 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements | Izstrādē |
88138 | ISO/IEC DIS 15408-4 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities | Aptauja slēgta |
88136 | ISO/IEC DIS 15408-3 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components | Izstrādē |
88135 | ISO/IEC DIS 15408-2 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components | Izstrādē |
88134 | ISO/IEC DIS 15408-1 | Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model | Izstrādē |
88133 | ISO/IEC PWI 22061 | Investigation of the effect of transmission media on QKD security evaluation and possible modifications to ISO/IEC 23837 (WG3 N2559) | Izstrādē |
88131 | ISO/IEC 20009-4:2017/CD Amd 1.2 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 | Izstrādē |
88130 | ISO/IEC CD 11770-4 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets | Izstrādē |
Displaying 81-90 of 774 results.