Documentos Temporales
(PLEN)
[ Origen: ISO/IEC JTC 1/SC 27 ] |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 2839-PLEN ]
|
LS/i on Cloud security and virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q8/17
|
2016-07-15 |
|
[ 2838-PLEN ]
|
LS/i on Trust service providers and incident and event management [N15854 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
WP1/17, Q8/17, Q7/17, Q6/17, Q4/17, Q3/17, Q11/17
|
2016-07-15 |
|
[ 2810-PLEN ]
|
LS/i on virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q8/17
|
2016-06-29 |
|
[ 2798-PLEN ]
|
LS/i on Text for WG 5 Standing Document 4 (SD4) -- Standard Privacy Assessment (SPA) [WG 5 N424 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2797-PLEN ]
|
LS/i on Text for ISO/IEC 1st WD 29184 - Information technology - Security techniques - Guidelines for online privacy notices and consent [WG 5 N380 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2796-PLEN ]
|
LS/i on Text for ISO/IEC 3rd WD 24761 - Information technology - Security techniques -- Authentication context for biometrics [WG 5 N378 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q9/17
|
2016-06-06 |
|
[ 2795-PLEN ]
|
LS/i on Text for ISO/IEC 2nd WD 20889 - Information technology - Security techniques -- Privacy enhancing data de-identification techniques [WG 5 N376 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2794-PLEN ]
|
LS/i on Text for DIS letter ballot - ITU-T X.gpim | ISO/IEC 29151 - Information technology - Security techniques - Code of practice for privacy personally identifiable information protection [N16317 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q3/17
|
2016-06-06 |
|
[ 2793-PLEN ]
|
LS/i on Text for ISO/IEC DIS 29134 -- Information technology -- Security techniques -- Privacy impact assessment - Methodology [N16315 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q3/17, Q10/17
|
2016-06-06 |
|
[ 2792-PLEN ]
|
LS/i on ISO/IEC 3rd CD 29003: Information technology -- Security techniques - Identity proofing [N16313 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2791-PLEN ]
|
LS/i on Austrian National body contribution for an Amendment to ISO/IEC 29115:2013 (1st ed.) - Information technology - Security techniques -- Entity authentication assurance framework [N15991 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q10/17
|
2016-06-06 |
|
[ 2790-PLEN ]
|
LS/i on ISO/IEC JTC 1/SC 27/WG 5 liaison statement to ITU-T SG 17 (Security) [N16253 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q9/17, Q7/17, Q3/17, Q10/17
|
2016-06-06 |
|
[ 2785-PLEN ]
|
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T FG AC [N15735 from ISO/IEC JTC 1/SC 27/WG 1]
|
ISO/IEC JTC 1/SC 27
|
Q3/17, Q1/17
|
2016-05-24 |
|
[ 2784-PLEN ]
(Rev.1) |
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T SG17 [N15736 from ISO/IEC JTC 1/SC 27/WG 1]
|
ISO/IEC JTC 1/SC 27
|
Q8/17, Q4/17, Q3/17
|
2016-05-24 |
Resultados :14 documentos
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):