Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Big data security and privacy - Security and privacy-preserving guidelines for multi-sourced data processing
00.60 Close of review
Information technology — Artificial intelligence — Controllability of automated artificial intelligence systems
00.00 Proposal for new project received
Information technology — Artificial intelligence — Overview of machine learning computing devices
60.00 Standard under publication
Information technology — Process assessment — Application of ISO/IEC/IEEE 12207 processes to the ISO/IEC 33020 process capability measurement scale
60.00 Standard under publication
Information technology — Process assessment — Application of ISO/IEC TS 33073 processes to the ISO/IEC 33020 process capability measurement scale
60.00 Standard under publication
Information technology — Artificial intelligence — Treatment of unwanted bias in classification and regression machine learning tasks
60.00 Standard under publication
Information technology — Service management — Part 15: Guidance on the application of Agile and DevOps principles in a service management system
60.00 Standard under publication
Information technology — Process assessment — Process assessment model for system life cycle processes
60.00 Standard under publication
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
20.20 Working draft (WD) study initiated
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
20.60 Close of comment period
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
20.60 Close of comment period
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
20.60 Close of comment period
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
20.60 Close of comment period
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
20.60 Close of comment period
Conformity assessment — Requirements for the operation of various types of bodies performing inspection
20.20 Working draft (WD) study initiated
Conformity assessment — General requirements for bodies operating certification of persons
20.60 Close of comment period
Conformity assessment — Fundamentals of product certification and guidelines for product certification schemes
20.60 Close of comment period
Information technology — Biometric System-on-Card — Part 1: Core requirements
20.60 Close of comment period