Documentos Temporales
�(PLEN)
�[�Origen:�ISO/IEC JTC 1/SC 27�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 2839-PLEN ]
�
� |
LS/i on Cloud security and virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2016-07-15 |
|
[ 2838-PLEN ]
�
� |
LS/i on Trust service providers and incident and event management [N15854 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
WP1/17, Q8/17, Q7/17, Q6/17, Q4/17, Q3/17, Q11/17
� |
2016-07-15 |
|
[ 2810-PLEN ]
�
� |
LS/i on virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2016-06-29 |
|
[ 2798-PLEN ]
�
� |
LS/i on Text for WG 5 Standing Document 4 (SD4) -- Standard Privacy Assessment (SPA) [WG 5 N424 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2797-PLEN ]
�
� |
LS/i on Text for ISO/IEC 1st WD 29184 - Information technology - Security techniques - Guidelines for online privacy notices and consent [WG 5 N380 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2796-PLEN ]
�
� |
LS/i on Text for ISO/IEC 3rd WD 24761 - Information technology - Security techniques -- Authentication context for biometrics [WG 5 N378 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q9/17
� |
2016-06-06 |
|
[ 2795-PLEN ]
�
� |
LS/i on Text for ISO/IEC 2nd WD 20889 - Information technology - Security techniques -- Privacy enhancing data de-identification techniques [WG 5 N376 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2794-PLEN ]
�
� |
LS/i on Text for DIS letter ballot - ITU-T X.gpim | ISO/IEC 29151 - Information technology - Security techniques - Code of practice for privacy personally identifiable information protection [N16317 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q3/17
� |
2016-06-06 |
|
[ 2793-PLEN ]
�
� |
LS/i on Text for ISO/IEC DIS 29134 -- Information technology -- Security techniques -- Privacy impact assessment - Methodology [N16315 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q3/17, Q10/17
� |
2016-06-06 |
|
[ 2792-PLEN ]
�
� |
LS/i on ISO/IEC 3rd CD 29003: Information technology -- Security techniques - Identity proofing [N16313 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2791-PLEN ]
�
� |
LS/i on Austrian National body contribution for an Amendment to ISO/IEC 29115:2013 (1st ed.) - Information technology - Security techniques -- Entity authentication assurance framework [N15991 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2790-PLEN ]
�
� |
LS/i on ISO/IEC JTC 1/SC 27/WG 5 liaison statement to ITU-T SG 17 (Security) [N16253 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q9/17, Q7/17, Q3/17, Q10/17
� |
2016-06-06 |
|
[ 2785-PLEN ]
�
� |
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T FG AC [N15735 from ISO/IEC JTC 1/SC 27/WG 1]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q3/17, Q1/17
� |
2016-05-24 |
|
[ 2784-PLEN ]
�
(Rev.1)� |
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T SG17 [N15736 from ISO/IEC JTC 1/SC 27/WG 1]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17, Q4/17, Q3/17
� |
2016-05-24 |
Resultados :14 documentos
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):