Documents Temporaires
(PLEN)
[ Source: ISO/IEC JTC1/SC27 ] [ AI/Question: Q10/17 ] ![Documents / Contributions](/res/templates/dms/images/key.gif) |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 1672-PLEN ]
|
LS/i on ISO/IEC 2nd CD24760-3: Information technology - Security techniques - A framework for identity management - Part 3: Practice [N14685 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q10/17
|
2015-02-12 |
|
[ 1671-PLEN ]
|
LS/i on ISO/IEC JTC 1/SC 27/WG 5 SD1 - WG 5 Roadmap [WG 5 N5 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q8/17, Q7/17, Q3/17, Q10/17
|
2015-02-12 |
|
[ 1669-PLEN ]
|
LS/i on ISO/IEC JTC 1/SC 27/WG5 Standing Document 4 (SD4) - Standard Privacy Assessment (SPA) [N14174 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q8/17, Q7/17, Q3/17, Q10/17
|
2015-02-12 |
|
[ 1668-PLEN ]
|
LS/i on Text for ISO/IEC FDIS 24760-2:2015-01-19(E) - Information technology - Security techniques - A framework for identity management - Part 2: Reference architecture and requirements [N14922 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q10/17
|
2015-02-12 |
|
[ 1666-PLEN ]
|
LS/i on Text for ISO/IEC 5th WD 29003 - Information technology - Security techniques - Identity proofing [WG 5 N9 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q10/17
|
2015-02-12 |
|
[ 1665-PLEN ]
|
LS/i on 5th WD 29134 Information technology - Security techniques - Privacy impact assessment - Methodology [WG5N7 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q8/17, Q7/17, Q3/17, Q10/17
|
2015-02-12 |
|
[ 1664-PLEN ]
|
LS/i on ISO/IEC 4th CD 29146 Information technology - Security techniques - A framework for access management [N14687 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q10/17
|
2015-02-12 |
|
[ 1662-PLEN ]
|
LS/i on Identity Management, Privacy Technology, and Biometrics [N14659 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC1/SC27
|
Q9/17, Q8/17, Q7/17, Q3/17, Q10/17
|
2015-02-12 |
Resultats:8 documents
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):