标准号 |
名 称 |
ISO/IEC 15408-1/2/3:1999 |
Information technology-Security techniques-Evaluation Criteria for IT Security |
ISO/IEC TR 13335-1:1996 |
nformation technology—Guidelines for the management of IT Security—Part1:Concepts and models for IT Security |
ISO/IEC TR 13335-2:1997 |
Information technology—Guidelines for the management of IT Security—Part2:Managing and planning IT Security |
ISO/IEC TR 13335-3:1998 |
Information technology—Guidelines for the management of IT Security—Part3:Techniques foe the management of IT Security |
ISO/IEC TR 13335-4:2000 |
Information technology—Guidelines for the management of IT Security—Part4:Selection of safeguards |
ISO/IEC TR 13335-5:2001 |
Information technology—Guidelines for the management of IT Security—Part5:Management guidance on network security |
ISO/IEC 10118-1:2000 |
Information technology—Security techniques—Hash-functions—Part1:General |
ISO/IEC 10118-2:2000 |
Information technology—Security techniques—Hash-functions—Part2:Hash-functions using an n-bit block cipher |
ISO/IEC 10118-3:1998 |
Information technology—Security techniques—Hash-functions—Part3:Dedicated Hash-functions |
ISO/IEC 10118-4:1998 |
Information technology—Security techniques—Hash-functions—Part4:Hash-functions using modular arithmetic |
ISO/IEC 11770-1:1996 |
Information technology - Security techniques -Key management - Part 1: Framework |
ISO/IEC 11770-2:1996 |
Information technology—Security techniques—Key management—Part2:Mechanisms using symmetric techniques |
ISO/IEC 17025:1999 |
Information technology-RemoteOperations:OSIrealizations-Remote Operations Service Element (ROSE) service definition |
ISO/IEC 13712-2:1995 |
Information technology-RemoteOperations:OSIrealizations-Remote Operations Service Element (ROSE) service definition |
ISO/IEC 13712-2:1995/Amd.1:1996 |
Amendment 1:Mapping to A-UNIT-DATA and built-in operations |
ISO/IEC JTC 1/SC 27 N 2305CD 15946-3 |
Information technology - Security techniques–Cryptographic techniques based on elliptic curves–Part 3: Key establishment |
BS ISO IEC 19796-3-2009 |
Information technology-Learning,education and training-Quality management,assurances and metrics |
BS ISO IEC 27001-2005 |
Information technology-Security techniques-Information security management systems-Requirements |
ISO/IEC JTC 1/SC 27 N 2333 |
Information Technology-Security Techniques-Guide for the |
|
Production ofPPsandSTs,Version0.8 |