Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Programming languages — Guidance for the use of the Ada Ravenscar Profile in high integrity systems

60.00 Standard under publication

ISO/IEC JTC 1/SC 22

Systems and software engineering — Life cycle management — Part 10: Guidelines for systems engineering agility

40.00 DIS registered

ISO/IEC JTC 1/SC 7

Systems and software engineering — Life cycle management — Part 4: Systems engineering management planning

40.00 DIS registered

ISO/IEC JTC 1/SC 7

Systems and software engineering — Life cycle management — Part 7: Application of systems engineering on defense programs

40.00 DIS registered

ISO/IEC JTC 1/SC 7

Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules

50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks

ISO/IEC JTC 1/SC 27

IT Security and Privacy — A framework for identity management — Part 1: Core concepts and terminology

50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks

ISO/IEC JTC 1/SC 27

IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements

50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks

ISO/IEC JTC 1/SC 27

IT Security and Privacy — A framework for identity management — Part 3: Practice

50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks

ISO/IEC JTC 1/SC 27

IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication

20.60 Close of comment period

ISO/IEC JTC 1/SC 27

Programming languages — Avoiding vulnerabilities in programming languages — Part 10: Vulnerability descriptions for programming language C++

20.60 Close of comment period

ISO/IEC JTC 1/SC 22

Programming languages — Avoiding vulnerabilities in programming languages — Part 11: Vulnerability descriptions for programming language Java

20.60 Close of comment period

ISO/IEC JTC 1/SC 22

Programming languages — Avoiding vulnerabilities in programming languages — Part 4: Vulnerability descriptions for the programming language Python

20.60 Close of comment period

ISO/IEC JTC 1/SC 22

Programming languages — Avoiding vulnerabilities in programming languages — Part 6: Vulnerability descriptions for programming language SPARK

20.60 Close of comment period

ISO/IEC JTC 1/SC 22

Information technology — Programming languages — Guidance to avoiding vulnerabilities in programming languages — Part 8: Catalogue of vulnerabilities for the programming language Fortran

10.20 New project ballot initiated

ISO/IEC JTC 1/SC 22

Information technology — Radio frequency identification (RFID) for item management — Software system infrastructure — Part 5: Device interface

40.60 Close of voting

ISO/IEC JTC 1/SC 31

Study and review of authenticate encryption mechanisms for the future revisions of standards

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards

00.00 Proposal for new project received

ISO/IEC JTC 1/SC 27

Information security — Attribute-Based Credentials

10.20 New project ballot initiated

ISO/IEC JTC 1/SC 27