03/652482 DC : DRAFT JUNE 2003
|
BS ISO/IEC 13335-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MANAGEMENT OF INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY - PART 1: CONCEPTS AND MODELS FOR INFORMATION AND COMMUNICATIONS TECHNOLOGY SECURITY MANAGEMENT |
08/30169511 DC : DRAFT DEC 2008
|
BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC 13888-2:2010
|
Information technology Security techniques Non-repudiation Part 2: Mechanisms using symmetric techniques |
09/30204721 DC : 0
|
BS ISO/IEC 9798-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
BS ISO/IEC TR 13335-5:2001
|
Information technology. Guidelines for the management of IT security Management guidance of network security |
CSA ISO/IEC TR 14516 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
BS ISO/IEC 9798-1:2010
|
Information technology. Security techniques. Entity authentication General |
CAN/CSA-ISO/IEC TR 14516-04 (R2017)
|
Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
BS ISO/IEC 17799 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
CSA ISO/IEC TR 14516 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 15945 : 2002 : R2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
ISO/IEC 15945:2002
|
Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
BS ISO/IEC 18028-5:2006
|
Information technology. Security techniques. IT network security Securing communications across networks using virtual private networks |
EG 202 009-1 : 1.3.1
|
USER GROUP; QUALITY OF TELECOM SERVICES; PART 1: METHODOLOGY FOR IDENTIFICATION OF INDICATORS RELEVANT TO THE USERS |
12/30236961 DC : 0
|
BS ISO/IEC 20008-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURES - PART 1: GENERAL |
BS ISO/IEC 20008-1:2013
|
Information technology. Security techniques. Anonymous digital signatures General |
ISO/IEC TR 14516:2002
|
Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
INCITS/ISO/IEC 17799 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 15945:2002
|
Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CSA ISO/IEC 13888-3 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 15945-04 (R2017)
|
Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
I.S. CWA 14365-1:2004
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES - PART 1: LEGAL AND TECHNICAL ASPECTS |
INCITS/ISO/IEC 18028-5 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS BETWEEN NETWORKS USING VIRTUAL PRIVATE NETWORKS |
ISO/IEC 17960:2015
|
Information technology Programming languages, their environments and system software interfaces Code signing for source code |
ISO/IEC 13888-3:2009
|
Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques |
BS 7799-1(2005) : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
TR 102 045 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); SIGNATURE POLICY FOR EXTENDED BUSINESS MODEL |
04/30062174 DC : DRAFT JUN 2004
|
ISO/IEC FCD 17799 - INFORMATION TECHNOLOGY - CODE OF PRACTICE FOR INFORMATION SECURITY MANAGEMENT |
BS ISO/IEC 17960:2015
|
Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
BS ISO/IEC 13888-3:1997
|
Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
BS ISO/IEC TR 14516:2002
|
Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
TS 118 111 : 2.4.1
|
ONEM2M; COMMON TERMINOLOGY (ONEM2M TS-0011 VERSION 2.4.1 RELEASE 2) |
TR 102 272 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
12/30186137 DC : 0
|
BS ISO/IEC 27002 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS |
CSA ISO/IEC 9798-1 :2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 1: GENERAL |
TR 102 206 : 1.1.3
|
MOBILE COMMERCE (M-COMM); MOBILE SIGNATURE SERVICE; SECURITY FRAMEWORK |
CSA ISO/IEC 18028-5 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
CAN/CSA-ISO/IEC 17960:16
|
Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01) |
ISO/IEC 18028-5:2006
|
Information technology Security techniques IT network security Part 5: Securing communications across networks using virtual private networks |
BS ISO/IEC 13888-2:2010
|
Information technology. Security techniques. Non-repudiation Mechanisms using symmetric techniques |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
03/652682 DC : DRAFT NOV 2003
|
BS ISO/IEC TR 15446 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDE FOR THE PRODUCTION OF PROTECTION PROFILES AND SECURITY TARGETS |
ES 201 733 : 1.1.3
|
ELECTRONIC SIGNATURE FORMATS |
TR 102 605 : 1.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); REGISTERED E-MAIL |
CAN/CSA-ISO/IEC 9798-1:12 (R2016)
|
Information technology - Security techniques - Entity authentication - Part 1: General (Adopted ISO/IEC 9798-1:2010, third edition, 2010-07-01) |
INCITS/ISO/IEC 18028-1 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 1: NETWORK SECURITY MANAGEMENT |
CSA ISO/IEC 15945 : 2004
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
SR 003 391 : 2.1.1
|
CLOUD STANDARDS COORDINATION PHASE 2; INTEROPERABILITY AND SECURITY IN CLOUD COMPUTING |
ISO/IEC 17799:2005
|
Information technology Security techniques Code of practice for information security management |
I.S. CWA 14365:2003
|
GUIDE ON THE USE OF ELECTRONIC SIGNATURES |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |
UNE-ETSI/TS 101733 V1.2.2:2011
|
Electronic signature formats. |
05/30104603 DC : DRAFT JUN 2005
|
ISO/IEC FCD 18028-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - IT NETWORK SECURITY - PART 5: SECURING COMMUNICATIONS ACROSS NETWORKS USING VIRTUAL PRIVATE NETWORKS |
09/30169508 DC : 0
|
BS ISO/IEC 13888-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 2: MECHANISMS USING SYMMETRIC TECHNIQUES |
CSA ISO/IEC 15945 : 2004 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
CSA ISO/IEC 13888-3:2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
ISO/IEC TR 13335-5:2001
|
Information technology Guidelines for the management of IT Security Part 5: Management guidance on network security |
ISO/IEC 20008-1:2013
|
Information technology — Security techniques — Anonymous digital signatures — Part 1: General |