Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Programming languages — Guidance for the use of the Ada Ravenscar Profile in high integrity systems
60.00 Standard under publication
Systems and software engineering — Life cycle management — Part 10: Guidelines for systems engineering agility
40.00 DIS registered
Systems and software engineering — Life cycle management — Part 4: Systems engineering management planning
40.00 DIS registered
Systems and software engineering — Life cycle management — Part 7: Application of systems engineering on defense programs
40.00 DIS registered
Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 1: Core concepts and terminology
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 3: Practice
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 10: Vulnerability descriptions for programming language C++
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 11: Vulnerability descriptions for programming language Java
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 4: Vulnerability descriptions for the programming language Python
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 6: Vulnerability descriptions for programming language SPARK
20.60 Close of comment period
Information technology — Programming languages — Guidance to avoiding vulnerabilities in programming languages — Part 8: Catalogue of vulnerabilities for the programming language Fortran
10.20 New project ballot initiated
Information technology — Radio frequency identification (RFID) for item management — Software system infrastructure — Part 5: Device interface
40.60 Close of voting
Study and review of authenticate encryption mechanisms for the future revisions of standards
00.00 Proposal for new project received
Inclusion of NTRU in ISO/IEC JTC 1/SC 27/WG 2 standards
00.00 Proposal for new project received
Information security — Attribute-Based Credentials
10.20 New project ballot initiated