Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Cloud computing and distributed platforms — Taxonomy for digital platforms
60.60 Standard published
Information technology — Cloud computing — Overview of platform capabilities type and platform as a service
60.00 Standard under publication
Information technology — Artificial intelligence — Controllability of automated artificial intelligence systems
60.60 Standard published
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
20.60 Close of comment period
Conformity assessment — General requirements for bodies operating certification of persons
20.60 Close of comment period
Conformity assessment — Fundamentals of product certification and guidelines for product certification schemes
20.60 Close of comment period
Information technology — Biometric System-on-Card — Part 1: Core requirements
20.60 Close of comment period
Information technology — Biometric System-on-Card — Part 3: Logical information interchange mechanism
20.60 Close of comment period
IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication
20.60 Close of comment period
Information technology — Security techniques — Information security management systems — Overview and vocabulary
20.60 Close of comment period
Cybersecurity and Privacy — Artificial Intelligence — Privacy protection
20.60 Close of comment period
Age assurance systems — Part 3: Benchmarks for benchmarking analysis
20.60 Close of comment period
Information technology — Security techniques — Entity authentication assurance framework
20.20 Working draft (WD) study initiated
Information security, cybersecurity and privacy protection — Verification of Cryptographic Protocols — Part 2: Evaluation Methods and Activities for Cryptographic Protocols
20.60 Close of comment period
Information security — Verification of cryptographic protocols — Part 3: Part 3: Evaluation Methods and Activities for Protocol Implementation Verification
20.60 Close of comment period
Information technology — Document description and processing languages — Office Open XML File Formats — Part 1: Fundamentals and Markup Language Reference
20.60 Close of comment period
Information technology — Document description and processing languages — Office Open XML File Formats — Part 4: Transitional Migration Features
20.60 Close of comment period