Search
Drupal Primary tabs
Search results
Showing items 1 through 10 of 40.
-
Information technology-- Security techniques-- Application security-- Part 6: Security guidance for specific applications
Information technology-- Security techniques-- Application security-- Part 6: Security guidance for specific applications ISO/IEC DIS 27034-6, Information technology-- Security techniques-- Application security-- Part 6: Security guidance for specific applications Committee: ISO/IEC JTC 1/SC 27 Comment Period
kjansa - 2019/05/03 - 07:31
-
Information technology-- Security techniques-- Digital signatures with appendix-- Part 3: Discrete logarithm based mechanisms
Digital signatures with appendix-- Part 3: Discrete logarithm based mechanisms Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-27 This part of ISO/IEC 14888 specifies digital signature
kjansa - 2019/05/03 - 07:31
-
Information technology-- Security techniques-- Modes of operation for an n-bit block cipher
Information technology-- Security techniques-- Modes of operation for an n-bit block cipher ISO/IEC DIS 10116 (Ed 4), Information technology-- Security techniques-- Modes of operation for an n-bit block cipher Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-10-17 This International Standard
kjansa - 2019/05/03 - 07:31
-
Information technology-- Security techniques-- Information security incident management
response Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-27 ISO/IEC 27035-1 is the foundation
kjansa - 2019/05/03 - 07:31
-
Information technology-- Security techniques-- Sector-specific application of ISO/IEC 27001-- Requirements
Information technology-- Security techniques-- Sector-specific application of ISO/IEC 27001-- Requirements ISO/IEC DIS 27009, Information technology-- Security techniques-- Sector-specific application of ISO/IEC 27001-- Requirements Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-27
kjansa - 2019/05/03 - 07:31
-
A framework for identity management
A framework for identity management ISO/IEC DIS 24760-3, Information technology-- Security techniques-- A framework for identity management-- Part 3: Practice Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-28 This International Standard provides guidance for practice of implementing
kjansa - 2019/05/03 - 07:31
-
Cryptographic techniques based on elliptic curves
Cryptographic techniques based on elliptic curves ISO/IEC DIS 15946-1 (Ed 3), Information technology-- Security techniques-- Cryptographic techniques based on elliptic curves-- Part 1: General Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-28 This part of ISO/IEC 15946 describes
kjansa - 2019/05/03 - 07:31
-
Information technology- Security techniques- A framework for access management
Information technology- Security techniques- A framework for access management ISO/IEC DIS 29146, Information technology- Security techniques- A framework for access management Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-27 This International Standard defines and establishes a framework
kjansa - 2019/05/03 - 07:31
-
Information technology-- Security techniques-- Lightweight cryptography-- Part 5: Hash-functions
Information technology-- Security techniques-- Lightweight cryptography-- Part 5: Hash-functions ISO/IEC DIS 29192-5, Information technology-- Security techniques-- Lightweight cryptography-- Part 5: Hash-functions Committee: ISO/IEC JTC1/SC 27 Comment Period Closes: 2015-09-27 This part of ISO/IEC 29192
kjansa - 2019/05/03 - 07:31
-
Draft New Suggestion for ISO/COPOLCO Activity
and Privacy activity inside SC27 - including work on the privacy gap assessment that you mention:
Suzanna Ersoy - 2015/04/02 - 14:19 - 2 comments