Program of Work

Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
CS1
:[]
Information technology - Security techniques - Information security management
guidelines for financial services
IS TR 27015:2012
:[]
Information technology - Security techniques -Information security for supplier
relationships - Part 1: Overview and concepts
IS 27036-1:2014
:[]
Information technology - Security techniques - Refining software vulnerability
analysis under ISO/IEC 18045
IS TR 20004:2012
INCITS/ISO/IEC 27010:2012:[2014]
Information technology -- Security techniques - Information security management for
inter-sector and inter-organizational communications
IS 27010:2012
INCITS/ISO/IEC 30111:2013:[2014]
Information technology -- Security techniques - Vulnerability handling processes
IS 30111:2013
INCITS/ISO/IEC 20009-1:2013:[2014]
Information technology -- Security techniques -- Anonymous entity authentication Part 1: General
IS 20009-1:2013
INCITS/ISO/IEC 29115:2013:[2014]
Information technology -- Security techniques --Entity authentication assurance
framework
IS 29115:2013
INCITS/ISO/IEC 20008-2:2013:[2014]
Information technology - Security techniques - Anonymous digital signatures - Part 2:
Mechanisms using a group public key
IS 20008-2:2013
:[]
Information technology - Security techniques - Information security for supplier
relationships - Part 2: Requirements
IS 27036-2:2014
Created: 2/6/2015
Page 1 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 29191:2012:[2014]
Information technology - Security techniques - Requirements for partially
anonymous, partially unlinkable authentication
IS 29191:2012
INCITS/ISO/IEC 20008-1:2013:[2014]
Information technology - Security techniques - Anonymous digital signatures - Part 1:
General
IS 20008-1:2013
INCITS/ISO/IEC 27037:2012:[2014]
Information technology - Security techniques - Guidelines for identification,
collection, acquistion, and preservation of digital evidence
IS 27037:2012
INCITS/ISO/IEC 27013:2012:[2014]
Information technology - Security techniques - Guidance on the integrated
implementation of ISO/IEC 27001 and ISO.IEC 20000-1
IS 27013:2012
INCITS 539:[]
Information technology - Management of Security Credentials Specification
:[]
Information technology - Security techniques — Guidelines for cybersecurity
IS 27032:2012
:[]
Information technology - Security techniques - Specification for digital redaction
IS 27038:2014
:[]
Information technology - Security techniques - Code of practice for protection of
personally identifiable information (PII) in public clouds acting as PII processors
INCITS/ISO 7064:2003:[S2013]
Information technology - Security techniques - Check character systems
Created: 2/6/2015
IS 7064:2003
Page 2 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 15816:2002:[S2012]
Information technology - Security Techniques - Security information objects for
access control
IS 15816:2002
INCITS/ISO/IEC 27005:2011:[2012]
Information technology -- Security techniques -- Information security risk
management
IS 27005:2011
INCITS/ISO/IEC 15408-2:2008:[2013]
Information technology - Security techniques - Evaluation Criteria for IT Security Part 2: Security functional requirements
IS 15408-2:2008
INCITS/ISO/IEC 15408-1:2009:[2012]
Information technology - Security techniques - Evaluation Criteria for IT Security Part 1: Introduction and general model
IS 15408-1: 2009
INCITS/ISO/IEC 15408-3:2008:[2013]
Information technology - Security techniques - Evaluation Criteria for IT Security Part 3: Security assurance requirements
IS 15408-3:2008
INCITS/ISO/IEC 11770-5:2011:[2012]
Information technology -- Security techniques - Key Management - Part 5: Group key
management
IS 11770-5:2011
:[]
Information technology - Security techniques - Key management - Part 2:
Mechanisms using symmetric techniques CORRIGENDUM
IS 11770-2:2008/COR1
:[]
Information technology - Security techniques - Key Management - Part 3:
Mechanisms using asymmetric techniques - CORRIGENDUM
IS 11770-3:2008/COR1
INCITS/ISO/IEC 11770-4:2006:[R2013]
Information technology - Security techniques - Key management - Part 4: Key
establishment mechanisms based on weak secrets
IS 11770-4:2006
Created: 2/6/2015
Page 3 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 11770-1:2010:[2013]
Information technology - Security techniques - Key Management - Framework
IS 11770-1:2010
INCITS/ISO/IEC 11770-3:2008:[R2014]
Information technology - security techniques - Key Management - Part 3:
Mechanisms using asymmetric techniques
IS 11770-3:2008
INCITS/ISO/IEC 11770-2:2008:[R2014]
Information technology - Security techniques - Key Management - Part 2:
Mechanisms using symmetric techniques
IS 11770-2:2008
INCITS/ISO/IEC 10116:2006:[R2013]
Information technology - Security techniques - Modes of operation for an n-bit block
cipher
IS 10116:2006
INCITS/ISO/IEC
10116:2006/COR1:2008:[R2014]
Information technology - Security Techniques - Modes of operation for an n-bit block
cipher - CORRIGENDUM 1
IS 10116:2006/COR1:2008
:[]
Information technology - Security techniques - Entity authentication - Part 4:
Mechanisms using a cryptographic check function - Technical Corrigendum 1
IS 9798-4:1999/COR 1:2009
INCITS/ISO/IEC 9798-6:2010:[2012]
Information technology - Security techniques - Entity authentication - Part 6:
Mechanisms using manual data transfer
IS 9798-6:2010
INCITS/ISO/IEC 9798-5:2009:[2010]
Information technology - Security techniques - Entity authentication - Part 5:
Mechanisms using zero knowledge techniques
IS 9798-5:2009
:[]
Information technology - Security techniques - Message Authentication Codes
(MACs) - Part 3: mechanisms using a universal hash function - Corrigenda 2
IS 9798-3:1998/COR2:2012
Created: 2/6/2015
Page 4 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 9798-2:2008:[2010]
Information technology - Security techniques - Entity authentication - Part 2:
Mechanisms using symetric encipherment algorithms
IS 9798-2:2008
:[]
Information technology- Security techniques- Entity authentication- Part 2:
Mechanisms using synthetic encripherment algorithms Corrigendum 1
IS 9798-2:2008/Cor1
INCITS/ISO/IEC 9798-4:1999:[R2014]
Information technology - Security techniques - Entity authentication - Part 4:
Mechanisms using a cryptographic check function (2nd edition)
IS 9798-4:1999
:[]
Information technology - Security techniques - Entity authentication - Part 4:
Mechanisms using a cryptographic check function - Technical Corrigendum 2
IS 9798-4:1999/COR 2:2012
INCITS/ISO/IEC 9798-1:2010:[2012]
Information technology - Security techniques - Entity authentication - Part 1: General
IS 9798-1:2010
:[]
Information technology- Security techniques- Entity authentication- Part 2:
Mechanisms using synthetic encripherment algorithms - Corrigendum 2
IS 9798-2:2008/COR2:2012
INCITS/ISO/IEC 9798-3:1998:[R2014]
Information technology - Security techniques _ Entity authentication - Part 3:
Mechanisms using digital signature techniques
IS 9798-3:1998
INCITS/ISO/IEC 9797-2:2011:[2012]
Information technology - Security techniques - Message authentication codes
(MACs) - Part 2: Mechanisms using a hash-function (3rd
IS 9797-2:2011
INCITS/ISO/IEC 9797-1:2011:[2014]
Information technology - Security techniques - Message authentication codes
(MACs) - Part 1: Mechanisms using block cipher
IS 9797-1:2011
Created: 2/6/2015
Page 5 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 9797-3:2011:[2012]
Information technology - Security techniques - Message authentication codes
(MACs) - Part 3: Mechanisms using a universal hash-function
IS 9797-3:2011
:[]
Information technology - Security techniques - Message authentication codes
(MACs) - Part 1: Mechanisms using a block cipher
IS 9797-1:2011
INCITS/ISO/IEC 13888-3:2009:[2010]
Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms
using asymmetric techniques
IS 13888-3:2009
INCITS/ISO/IEC 13888-1:2009:[R2014]
Information technology - Security techniques - Non-repudiation - Part 1: General
IS 13888-1:2009
INCITS/ISO/IEC 13888-2:2010:[2012]
Information technology - Security techniques - Non-repudiation - Part 2:
Mechanisms using symmetric techniques
IS 13888-2:2010
INCITS/ISO/IEC 9796-2:2010:[2012]
Information technology - Security techniques - Digital signature schemes giving
message recovery - Part 2: Integer factorization based mechanisms
IS 9796-2:2010
INCITS/ISO/IEC 9796-3:2006:[R2013]
Information technology - Security techniques - Digital signature schemes giving
message recovery - Part 3: Discrete logarithm based mechanisms
IS 9796-3:2006
INCITS/ISO/IEC 148883:2006/AM2:2012:[2014]
Information technology - Security techniques - Digital signatures with appendix - Part
3: Discrete logarithm based mechanisms - AMENDMENT 2: Optimizing hash inputs
IS 14888-3:2006/AM2:2012
INCITS/ISO/IEC 148883:2006/COR1:2007:[R2014]
Information technology - Security techniques - Digital signatures with appendix - Part
3: Discrete logarithm based mechanisms - CORRIGENDUM 1
IS 14888-3:2006/COR1:2007
Created: 2/6/2015
Page 6 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 14888-3:2006:[R2013]
Information technology - Security techniques - Digital signatures with appendix - Part
3: Discrete alogrithm based mechanisms
IS 14888-3:2006
INCITS/ISO/IEC 14888-3:2006/COR
2:2009:[R2014]
Information technology - Security Techniques - Digital signatures with appendix Part 3: Discrete logarithm based mechanisms -- CORRIGENDUM 2
IS 14888-3:2006/COR 2:2009
:[]
Information technology - Security techniques - Digital signatures with appendix - Part
3: Discrete logarithm based mechanisms - AMENDMENT 1
IS 14888-3:2006/AM1:2010
INCITS/ISO/IEC 14888-2:2008:[R2014]
Information technology - Security techniques - Digital signatures with appendix - Part
2: Integer factorization based mechanisms
IS 14888-2:2008
INCITS/ISO/IEC 14888-1:2008:[2010]
Information technology - Security techniques - Digital signatures with appendix - Part
1: General
IS 14888-1:2008
INCITS/ISO/IEC 10118-2:2010:[2011]
Information technology - Security techniques - Hash-functions - Part 2: Hashfunctions using an n-bit block cpher
IS 10118-2:2010
INCITS/ISO/IEC 10118-4:1998:[S2013]
Information technology - Security techniques - Hash functions: Part 4: Hash
functions using modular arithmetic
IS 10118-4:1998
:[]
Information technology - Security techniques - Hash-functions - Part 2: Hashfunctions using an n-bit block cpher
IS 10118-2:2010/COR1:2011
INCITS/ISO/IEC 10118-3:2004:[R2014]
Information technology - Security techniques - Hash-functions - Part 3: Dedicated
hash-functions
IS 10118-3:2004
Created: 2/6/2015
Page 7 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 101183:2004/AM1:2006:[R2014]
Information technology - Security techniques - Hash-functions - Part 3: Dedicated
hash-function 8 (SHA-224) AMENDMENT 1
IS 10118-3:2004/AM1:2006
INCITS/ISO/IEC 10118-1:2000:[R2014]
Information technology - Security techniques - Hash-functions - Part 1: General
IS 10118-1:2000
:[]
Information technology - Security techniques - Hash-functions - Part 3: Dedicated
hash-function 8 Corrigendum 1
IS 10118-3:2004/COR1:2011
:[]
Information technology - Security techniques - Security Assurance framework - Part
2: Analysis
IS TR 15443-2:2012
:[]
Information technology - Security techniques - A framework for IT security
assurance - Part 1: Overview and Framework
TR 15443-1-2012
INCITS/ISO/IEC 15945:2002:[S2012]
Information technology - Security techniques - Specification of TTP services to
support the application of digital signatures
IS 15945:2002
:[]
Information technology - Security techniques - IT intrusion detection framework
TR 15947:2002
INCITS/ISO/IEC 15946-5:2009:[2012]
Information technology - Security techniques - Cryptographic techniques based on
elliptic curves - Part 5: Elliptic Curve Generation
IS 15946-5:2009
Created: 2/6/2015
Page 8 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 15946-1:2008:[R2014]
Information technology - Security techniques - Cryptographic techniques based on
elliptic curves - Part 1: General
IS 15946-1:2008
:[]
Information technology - Security techniques - Cryptographic techniques based on
elliptic curves - Part 1: General - Technical Corrigendum 2
IS 15946-1:2008/COR 2:2014
INCITS/ISO/IEC 15946-1:2008/COR
1:2009:[R2014]
Information technology - Security techniques - Cryptographic techniques based on
elliptic curves - Part 1: General - Technical Corrigendum 1
IS 15946-1:2008/COR 1:2009
INCITS/ISO/IEC 18028-3:2005:[R2013]
Information technology - Security techniques - IT network security - Part 3: Securing
communications between networks using security gateways
IS 18028-3:2005
:[]
Information technology - Security techniques - IT network security - Part 3: Securing
communications between networks using security gateways
IS 18028-3:2014
INCITS/ISO/IEC 18028-4:2005:[R2014]
Information technology - Security techniques - IT network security - Part 4: Securing
Remote Access
IS 18028-4:2005
:[]
Information technology - Security techniques - IT network security - Part 5: Securing
communications between networks using Virtual Private Networks
IS 18028-5:2013
INCITS/ISO/IEC 18028-5:2006:[R2013]
Information technology - Security techniques - IT network security - Part 5: Securing
communications between networks using Virtual Private Networks
IS 18028-5:2006
:[]
Information technology - Security techniques - Random bit generation - Techncial
Corrigendum1
IS 18031:2011/COR 1:2014
Created: 2/6/2015
Page 9 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 18031:2011:[2012]
Information technology - Security techniques - Random bit generation
IS 18031:2011
INCITS/ISO/IEC 18032:2005:[R2014]
Information technology - Security techniques - Prime number generation
IS 18032:2005
INCITS/ISO/IEC 18033-4:2011:[2012]
Information technology - Security techniques - Encryption algorithms - Part 4:
Stream ciphers
IS 18033-4:2011
INCITS/ISO/IEC 18033-1:2005/AM
1:2011:[2012]
Information technology - Security techniques - Encryption algorithms - Part 1:
General -- Amendment 1
IS 18033-1:2005/AM 1:2011
INCITS/ISO/IEC 18033-3:2010:[2012]
Information technology - Security techniques - Encryption algorithms - Part 3: Block
ciphers
IS 18033-3:2010
INCITS/ISO/IEC 18033-2:2006:[R2013]
Information technology - Security techniques - Encryption algorithms - Part 2:
Asymmetric ciphers
IS 18033-2:2006
INCITS/ISO/IEC 18033-1:2005:[R2014]
Information technology - Security techniques - Encryption algorithms - Part 1:
General
IS 18033-1:2005
:[]
Information technology - Security techniques - Encryption algorithm
IS 18033:2000
:[]
Information technology - Security techniques - Encryption algorithms - Part 4:
Stream ciphers
FDAM 18033-4:2005/AM1
Created: 2/6/2015
Page 10 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 18043:2006:[R2013]
Information technology - Security techniques - Selection, deployment and operations
of Intrusion Detection Systems (IDSs)
IS 18043:2006
ISO/IEC 18045:2008:[R2013]
information technology - Security techniques - Methodology for IT Security Evaluation
IS 18045:2008
INCITS/ISO/IEC 27002:2013:[2014]
Information technology - Security techniques - Code of practice for information
security controls
IS 27002:2013
INCITS/ISO/IEC 18014-1:2008:[2010]
Information technology - Security techniques - Time stamping services - Part 1:
Framework
IS 18014-1:2008
INCITS/ISO/IEC 18014-1:2009:[R2014]
Information technology - Security techniques - Time stamping services - Part 1:
Framework
IS 18014-1:2009
INCITS/ISO/IEC 18014-2:2009:[2010]
Information technology - Security techniques - Time stamping services - Part 2:
Mechanisms producing independent tokens
IS 18014-2:2009
INCITS/ISO/IEC 18014-3:2009:[2010]
Information technology - Security techniques - Time stamping services - Part 3:
Mechanisms producing linked tokens
IS 18014-3:2009
INCITS 359-:2012[]
Information Technology - Cyber Security - Role Based Access Control (RBAC)
Created: 2/6/2015
Page 11 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
:[]
Information technology - Security techniques - Authenticated encryption- Technical
Corrigendum 1
IS 19772:2009/COR 1:2014
INCITS/ISO/IEC 19772:2009:[R2014]
Information technology - Security techniques - Authenticated encryption
IS 19772:2009
INCITS/ISO/IEC 19790:2012:[2014]
Information technology - Security techniques - Security requirements for
cryptographic modules
IS 19790:2012
INCITS/ISO/IEC 19792:2009:[2012]
Information technology - Security techniques - Security evaluation of biometrics
IS 19792:2009
INCITS/ISO/IEC 24745:2011:[2012]
Information technology - Security techniques - Biometric template protection
IS 24745:2011
INCITS 459-:2011[]
Information technology - Requirements for the Implementation and Interoperability of
Role Based Access Control (RBAC)
:[]
Information technology - Security techniques - Information security management
systems - Requirements - Technical Corrigendum 1
IS 27001:2013/COR 1:2014
INCITS/ISO/IEC 27001:2013:[2014]
Information technology - Security techniques - Information security management
systems - Requirements
IS 27001:2013
Created: 2/6/2015
Page 12 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 27001:2005:[R2011]
Information technology - Security techniques - Information security management
systems - Requirements
IS 27001:2005
ISO/IEC 27004:2009:[]
Information Technology - Security techniques - Information security management
measurement
IS 27004:2009
INCITS/ISO/IEC 27003:2010:[2012]
Information technology- Security techniques - Information security management
system implementation guidance
IS 27003:2010
INCITS/ISO/IEC 24762:2008:[R2014]
Information technology - Security techniques - Guidelines for information and
communications technology disaster recovery services
IS 24762:2008
INCITS/ISO/IEC 24761:2009:[R2014]
Information technology - Security techniques - Authentication context for biometrics
IS 24761:2009
:[]
Information technology- Security techniques - A framework for identity management
WD 24760
INCITS/ISO/IEC 24759:2014:[2014]
Information technology- Security techniques - Test requirements for cryptographic
modules
IS 24759:2014
Created: 2/6/2015
Page 13 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
INCITS/ISO/IEC 27000:2012:[2014]
Information technology - Security techniques - Information security management
systems-- Overview and vocabulary
IS 27000:2012
INCITS/ISO/IEC 27006:2011:[2012]
Information technology - Security techniques - requirements for bodies providing
audit and certification of information security management systems
IS 27006:2011
INCITS/ISO/IEC 29100:2011:[2012]
Information technology - Security techniques - Privacy framework
IS 29100:2011
:[]
Information technology - Security techniques -- Privacy reference architecture
WD 29101
INCITS/ISO/IEC 11889-4:2009:[R2014]
Information technology - Trusted Platform Module - Part 4: Commands
IS 11889-4:2009
INCITS/ISO/IEC 11889-2:2009:[R2014]
Information technology - Trusted Platform Module - Part 2: Design Principles
IS 11889-2:2009
INCITS/ISO/IEC 11889-1:2009:[R2014]
Information technology - Trusted Platform Module - Part 1: Overview
IS 11889-1:2009
INCITS/ISO/IEC 11889-3:2009:[R2014]
Information technology - Trusted Platform Module - Part 3: Structures
IS 11889-3:2009
Created: 2/6/2015
Page 14 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
INCITS/ISO/IEC 27011:2008:[R2014]
Information technology - Security techniques - Information security management
guidelines for telecommunications organizations based on ISO/IEC 27002
INCITS 525:[]
Next Generation Access Control - Implementation Requirements, Protocols and API
Definitions (NGAC-IRPADS)
INCITS 499-:[]
Next Generation Access Control - Functional Architecture (NGAC-FA)
INCITS 499-:2013[`]
Next Generation Access Control - Functional Architecture (NGAC-FA)
INCITS 526:[]
Next Generation Access Control - Generic Operations & Abstract Data Structures
(NGAC-GOADS)
INCITS 527:[]
Information technology - Cyber Security -- Process for Defining Roles for Role Based
Access Control
INCITS 494-:2012[]
Information technology - Role Based Access Control -- Policy Enhanced
:[]
Information technology - Security techniques - Information security incident
managment
Created: 2/6/2015
ISO/IEC Document
IS 27011:2008
IS 27035:2011
Page 15 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
:[]
Information technology -- Security techniques -- Application security -- Part 1:
Overview and concepts
IS 27034-1:2011
:[]
Information technology -- Security techniques -- Guidelines for auditors on
information security controls
IS 27008:2011
:[]
Information technology -- Security techniques -- Guidelines for information and
communication technology readiness for business continuity
IS 27031:2011
INCITS/ISO/IEC 27033-1:2009:[2012]
Information technology - Security techniques - Cryptographic techniques based on
elliptic curves - Part 5: Elliptic Curve Generation
IS 27033-1:2009
INCITS/ISO/IEC 27033-2:2012:[2014]
Information technology -- Security techniques -- Network security -- Part 2:
Guidelines for the design and implementation of network security
IS 27033-2:2012
:[]
Information technology -- Security techniques -- Network security -- Part 4: Securing
communication between networks using security gateways
IS 27033-4:2014
:[]
Information technology -- Security techniques -- Information security management Organizational economics
IS TR 27016:2014
INCITS/ISO/IEC 27033-3:2010:[2012]
Information technology -- Security techniques -- Network security -- Part 3:
Reference networking scenarios -- Threats, design techniques and control issues
IS 27033-3:2010
INCITS/ISO/IEC 27033-5:2013:[2014]
Information technology -- Security techniques -- Network security -- Part 5: Securing
communications acrosss networks using Virtual Private Networks (VPNs)
IS 27033-5:2013
Created: 2/6/2015
Page 16 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
:[]
Information technology -- Security techniques - Vulnerability disclosure
IS 29147:2014
INCITS/ISO/IEC 27007:2011:[2012]
Information technology -- Security techniques -- Guidelines for information security
management systems auditing
IS 27007:2011
INCITS/ISO/IEC 29192-3:2012:[2014]
Information technology -- Security techniques -- Lightweight cryptography -- Part 3:
Stream ciphers
IS 29192-3:2012
INCITS/ISO/IEC 29192-2:2012:[2012]
Information technology -- Security techniques -- Lightweight cryptography -- Part 2:
Block ciphers
IS 29192-2:2012
:[]
Information technology -- Security techniques -- Lightweight cryptography -- Part 1:
General
IS 29192-1:2012
INCITS/ISO/IEC 29192-4:2013:[2014]
Information technology -- Security techniques -- Lightweight cryptography -- Part 4:
Mechanisms using asymmetric techniques
IS 29192-4:2013
INCITS/ISO/IEC 29128:2011:[2012]
Information technology - Security techniques - Verification of cryptographic protocols
IS 29128:2011
:[]
Information technology - Security techniques - A framework for identity
management -- Part 1: Terminology and concepts
IS 24760-1:2011
Created: 2/6/2015
Page 17 of 18
Committee: (CS1) - Cyber Security
National Designation
Title
(Click here to purchase standards)
ISO/IEC Document
:[]
Information technology - Security techniques - Signcryption - Technical Corrigendum
1
IS 29150:2011/COR 1:2014
INCITS/ISO/IEC 29150:2011:[2012]
Information technology - Security techniques - Signcryption
IS 29150:2011
:[]
Information technology -- Security techniques -- Best practices for the provision and
use of time-stamping services
IS TR 29149:2012
:[]
Information technology -- Security techniques -- Governance of information security
WD 27014
Created: 2/6/2015
Page 18 of 18