Documents Temporaires
�(PLEN)
�[�Source:�ISO/IEC JTC 1/SC 27�]��� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 2839-PLEN ]
�
� |
LS/i on Cloud security and virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2016-07-15 |
|
[ 2838-PLEN ]
�
� |
LS/i on Trust service providers and incident and event management [N15854 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
WP1/17, Q8/17, Q7/17, Q6/17, Q4/17, Q3/17, Q11/17
� |
2016-07-15 |
|
[ 2810-PLEN ]
�
� |
LS/i on virtualization security [N16428 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2016-06-29 |
|
[ 2798-PLEN ]
�
� |
LS/i on Text for WG 5 Standing Document 4 (SD4) -- Standard Privacy Assessment (SPA) [WG 5 N424 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2797-PLEN ]
�
� |
LS/i on Text for ISO/IEC 1st WD 29184 - Information technology - Security techniques - Guidelines for online privacy notices and consent [WG 5 N380 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2796-PLEN ]
�
� |
LS/i on Text for ISO/IEC 3rd WD 24761 - Information technology - Security techniques -- Authentication context for biometrics [WG 5 N378 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q9/17
� |
2016-06-06 |
|
[ 2795-PLEN ]
�
� |
LS/i on Text for ISO/IEC 2nd WD 20889 - Information technology - Security techniques -- Privacy enhancing data de-identification techniques [WG 5 N376 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2794-PLEN ]
�
� |
LS/i on Text for DIS letter ballot - ITU-T X.gpim | ISO/IEC 29151 - Information technology - Security techniques - Code of practice for privacy personally identifiable information protection [N16317 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q3/17
� |
2016-06-06 |
|
[ 2793-PLEN ]
�
� |
LS/i on Text for ISO/IEC DIS 29134 -- Information technology -- Security techniques -- Privacy impact assessment - Methodology [N16315 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q3/17, Q10/17
� |
2016-06-06 |
|
[ 2792-PLEN ]
�
� |
LS/i on ISO/IEC 3rd CD 29003: Information technology -- Security techniques - Identity proofing [N16313 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2791-PLEN ]
�
� |
LS/i on Austrian National body contribution for an Amendment to ISO/IEC 29115:2013 (1st ed.) - Information technology - Security techniques -- Entity authentication assurance framework [N15991 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q10/17
� |
2016-06-06 |
|
[ 2790-PLEN ]
�
� |
LS/i on ISO/IEC JTC 1/SC 27/WG 5 liaison statement to ITU-T SG 17 (Security) [N16253 from ISO/IEC JTC 1/SC 27]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q9/17, Q7/17, Q3/17, Q10/17
� |
2016-06-06 |
|
[ 2785-PLEN ]
�
� |
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T FG AC [N15735 from ISO/IEC JTC 1/SC 27/WG 1]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q3/17, Q1/17
� |
2016-05-24 |
|
[ 2784-PLEN ]
�
(Rev.1)� |
LS/i from ISO/IEC JTC 1/SC 27/WG 1 to ITU-T SG17 [N15736 from ISO/IEC JTC 1/SC 27/WG 1]
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17, Q4/17, Q3/17
� |
2016-05-24 |
Resultats:14 documents
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):