国际标准
2017-07-14 来源: 中国信息安全测评中心
序号 |
标准号 |
名 称 |
1 |
ISO/IEC 15408-1/2/3:1999 |
Information technology-Security techniques-Evaluation Criteria for IT Security |
2 |
ISO/IEC TR 13335-1:1996 |
Information technology—Guidelines for the management of IT Security —Part1:Concepts and models for IT Security |
3 |
ISO/IEC TR 13335-2:1997 |
Information technology—Guidelines for the management of IT Security —Part2:Managing and planning IT Security |
4 |
ISO/IEC TR 13335-3:1998 |
Information technology—Guidelines for the management of IT Security —Part3:Techniques foe the management of IT Security |
5 |
ISO/IEC TR 13335-4:2000 |
Information technology—Guidelines for the management of IT Security —Part4:Selection of safeguards |
6 |
ISO/IEC TR 13335-5:2001 |
Information technology—Guidelines for the management of IT Security —Part5:Management guidance on network security |
7 |
ISO/IEC 10118-1:2000 |
Information technology—Security techniques—Hash-functions—Part1:General |
8 |
ISO/IEC 10118-2:2000 |
Information technology—Security techniques—Hash-functions—Part2:Hash-functions using an n-bit block cipher |
9 |
ISO/IEC 10118-3:1998 |
Information technology—Security techniques—Hash-functions—Part3:Dedicated Hash-functions |
10 |
ISO/IEC 10118-4:1998 |
Information technology—Security techniques—Hash-functions—Part4:Hash-functions using modular arithmetic |
11 |
ISO/IEC 11770-1: 1996 |
Information technology - Security techniques -Key management - Part 1: Framework |
12 |
ISO/IEC 11770-2:1996 |
Information technology—Security techniques—Key management—Part2:Mechanisms using symmetric techniques |
13 |
ISO/IEC 17025:1999 |
General requirements for the competence of testing and calibration laboratories |
14 |
ISO/IEC 13712-2:1995 |
Information technology-Remote Operations:OSI realizations-Remote Operations Service Element (ROSE) service definition |
15 |
ISO/IEC 13712-2:1995/Amd.1:1996 |
Amendment 1:Mapping to A-UNIT-DATA and built-in operations |
16 |
ISO/IEC JTC 1/SC 27 N 2305 CD 15946-3 |
Information technology - Security techniques –Cryptographic techniques based on elliptic curves – Part 3: Key establishment |
17 |
ISO/IEC JTC 1/SC 27 N 2333 |
Information Technology-Security Techniques-Guide for the Production of PPs and STs,Version 0.8 |
18 |
ISO/IEC 14443 |
识别卡无触点集成电路卡——邻近卡 |
19 |
ISO/IEC 7816-1:1987 |
识 别 卡 带 触 点 的 集 成 电 路 卡 第 1 部 分 : 物 理 特 性 |
20 |
ISO/IEC 7816-2:1988 |
识 别 卡 带 触 点 的 集 成 电 路 卡 第 2 部 分 : 触 点 尺 寸 和 位 置 |
21 |
ISO/IEC 7816-3:1989 |
识 别 卡 带 触 点 的 集 成 电 路 卡 第 3 部 分 : 电 信 号 和 传 输 协 议 |
22 |
ISO/IEC 7816-4:1995 |
Interindustry command for interchange |
23 |
ISO/IEC 10536-1:1992 |
识别卡无触点集成电路卡第1部分:物理特性 |
24 |
ISO/IEC 10536-2:1995 |
识别卡——无触点集成电路卡 第2部分:耦合区的尺寸和位置 |
25 |
ISO/IEC 10536-3:1995 |
识别卡无触点集成电路卡 第3部分:电信号和复位规程 |