Temporary Documents
(PLEN)
[ Source: ISO/IEC JTC 1/SC 27 ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 2839-PLEN ]
|
LS/i on Cloud security and virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q8/17
|
2016-07-15 |
|
[ 2838-PLEN ]
|
LS/i on Trust service providers and incident and event management [N15854 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
WP1/17, Q8/17, Q7/17, Q6/17, Q4/17, Q3/17, Q11/17
|
2016-07-15 |
|
[ 2810-PLEN ]
|
LS/i on virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q8/17
|
2016-06-29 |
|
[ 2798-PLEN ]
|
LS/i on Text for WG 5 Standing Document 4 (SD4) -- Standard Privacy Assessment (SPA) [WG 5 N424 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2797-PLEN ]
|
LS/i on Text for ISO/IEC 1st WD 29184 - Information technology - Security techniques - Guidelines for online privacy notices and consent [WG 5 N380 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2796-PLEN ]
|
LS/i on Text for ISO/IEC 3rd WD 24761 - Information technology - Security techniques -- Authentication context for biometrics [WG 5 N378 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q9/17
|
2016-06-06 |
|
[ 2795-PLEN ]
|
LS/i on Text for ISO/IEC 2nd WD 20889 - Information technology - Security techniques -- Privacy enhancing data de-identification techniques [WG 5 N376 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2794-PLEN ]
|
LS/i on Text for DIS letter ballot - ITU-T X.gpim | ISO/IEC 29151 - Information technology - Security techniques - Code of practice for privacy personally identifiable information protection [N16317 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q3/17
|
2016-06-06 |
|
[ 2793-PLEN ]
|
LS/i on Text for ISO/IEC DIS 29134 -- Information technology -- Security techniques -- Privacy impact assessment - Methodology [N16315 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q3/17, Q10/17
|
2016-06-06 |
|
[ 2792-PLEN ]
|
LS/i on ISO/IEC 3rd CD 29003: Information technology -- Security techniques - Identity proofing [N16313 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2791-PLEN ]
|
LS/i on Austrian National body contribution for an Amendment to ISO/IEC 29115:2013 (1st ed.) - Information technology - Security techniques -- Entity authentication assurance framework [N15991 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2790-PLEN ]
|
LS/i on ISO/IEC JTC 1/SC 27/WG 5 liaison statement to ITU-T SG 17 (Security) [N16253 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q9/17, Q7/17, Q3/17, Q10/17
|
2016-06-06 |
|
[ 2785-PLEN ]
|
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T FG AC [N15735 from ISO/IEC JTC 1/SC 27/WG 1]
|
ISO/IEC JTC 1/SC 27
|
Q3/17, Q1/17
|
2016-05-24 |
|
[ 2784-PLEN ]
(Rev.1) |
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T SG17 [N15736 from ISO/IEC JTC 1/SC 27/WG 1]
|
ISO/IEC JTC 1/SC 27
|
Q8/17, Q4/17, Q3/17
|
2016-05-24 |
Results:14 total items.
|
Multiple Document Download: Formats and Languages to be included (when available):