Documentos Temporales
�(PLEN)
�[�Origen:�ISO/IEC JTC1/SC27�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 1674-PLEN ]
�
� |
LS/i on ITU-T X.cc-control | ISO/IEC 27017 [N14736, N14925 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q8/17, Q3/17
� |
2015-02-13 |
|
[ 1673-PLEN ]
�
� |
LS/i on ITU-T X.1051 | ISO/IEC 27011 [N14728, N14710 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q3/17
� |
2015-02-13 |
|
[ 1672-PLEN ]
�
� |
LS/i on ISO/IEC 2nd CD24760-3: Information technology - Security techniques - A framework for identity management - Part 3: Practice [N14685 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q10/17
� |
2015-02-12 |
|
[ 1671-PLEN ]
�
� |
LS/i on ISO/IEC JTC 1/SC 27/WG 5 SD1 - WG 5 Roadmap [WG 5 N5 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q8/17, Q7/17, Q3/17, Q10/17
� |
2015-02-12 |
|
[ 1670-PLEN ]
�
� |
LS/i on ISO/IEC JTC 1/SC 27/WG5 Standing Document 5 - Explanation on the use of ISO/IEC 27001 (ISMS) for privacy management [WG 5 N16 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q3/17
� |
2015-02-12 |
|
[ 1669-PLEN ]
�
� |
LS/i on ISO/IEC JTC 1/SC 27/WG5 Standing Document 4 (SD4) - Standard Privacy Assessment (SPA) [N14174 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q8/17, Q7/17, Q3/17, Q10/17
� |
2015-02-12 |
|
[ 1668-PLEN ]
�
� |
LS/i on Text for ISO/IEC FDIS 24760-2:2015-01-19(E) - Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements [N14922 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q10/17
� |
2015-02-12 |
|
[ 1667-PLEN ]
�
� |
LS/i on Recommendation ITU-T X.1085 | ISO/IEC 2nd CD 17922: Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module [N14681 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q9/17, Q11/17
� |
2015-02-12 |
|
[ 1666-PLEN ]
�
� |
LS/i on Text for ISO/IEC 5th WD 29003 - Information technology - Security techniques - Identity proofing [WG 5 N9 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q10/17
� |
2015-02-12 |
|
[ 1665-PLEN ]
�
� |
LS/i on 5th WD 29134 Information technology - Security techniques - Privacy impact assessment - Methodology [WG5N7 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q8/17, Q7/17, Q3/17, Q10/17
� |
2015-02-12 |
|
[ 1664-PLEN ]
�
� |
LS/i on ISO/IEC 4th CD 29146 Information technology - Security techniques - A framework for access management [N14687 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q10/17
� |
2015-02-12 |
|
[ 1663-PLEN ]
�
� |
LS/i on Text for draft Recommendation ITU-T X.gpim | ISO/IEC 4th WD 29151 - Information technology - Security techniques - Code of practice for Personally Identifiable Information protection) [WG5 N11 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q3/17
� |
2015-02-12 |
|
[ 1662-PLEN ]
�
� |
LS/i on Identity Management, Privacy Technology, and Biometrics [N14659 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC1/SC27
� |
Q9/17, Q8/17, Q7/17, Q3/17, Q10/17
� |
2015-02-12 |
Resultados :13 documentos
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):