Document Details - eb-2018-00063-Public-review-register-Adoptions-Comments-due-04-10-2018.pdf
Document Details | |
Name | ![]() |
Description | The public review for the adoption of the following standards is from February 9, 2018 to April 10, 2018. INCITS/ISO/IEC 10118-4:1998/AM 1:2014[201x], Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic - Amendment 1: Object identifiers INCITS/ISO/IEC 10118-4:1998/COR 1:2014[201x], Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic Technical Corrigendum 1 INCITS/ISO/IEC 11770-3:2015[201x], Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques INCITS/ISO/IEC 14776-112:2002[201x], Information technology - Small Computer System Interface (SCSI) - Part 112: Parallel Interface-2 (SPI-2) INCITS/ISO/IEC 14776-153:2015[201x], Information technology - Small Computer System Interface (SCSI) - Part 153: Serial Attached SCSI - 2.1 (SAS-2.1) INCITS/ISO/IEC 14776-222:2005[201x], Information technology - Small Computer System Interface (SCSI) - Part 222: Fibre Channel Protocol for SCSI, Second Version (FCP-2) INCITS/ISO/IEC 14776-326:2015[201x], Information technology - Small Computer System Interface (SCSI) - Part 326: Reduced Block Commands (RBC) INCITS/ISO/IEC 14776-331:2002[201x], Information technology -- Small Computer System Interface (SCSI) -- Part 331: Stream Commands (SSC) INCITS/ISO/IEC 14776-351:2007[201x], Information technology - Small Computer System Interface-3 (SCSI-3) - Part 351: Medium Changer Commands (SCSI-3 SMC) INCITS/ISO/IEC 14776-362:2006[201x], Information technology - Small Computer System Interface (SCSI) - Part 362: SCSI Multimedia Commands - 2 (MMC-2) INCITS/ISO/IEC 14776-412:2006[201x], Information technology - Small Computer System Interface (SCSI) - Part 412: Architecture Model -2 (SAM-2) INCITS/ISO/IEC 14888-2:2008/COR 1:2015[201x], Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms Technical Corrigendum 1 INCITS/ISO/IEC 17825:2016[201x], Information technology - Security techniques - Testing methods for the mitigation of non-invasive attack classes against cryptographic modules INCITS/ISO/IEC 17826:2016[201x], Information technology - Cloud Data Management Interface (CDMI) INCITS/ISO/IEC 18014-4:2015[201x], Information technology - Security techniques - Timestamping services - Part 4: Traceability of time sources INCITS/ISO/IEC 18031:2011/COR 1:2014[201x], Information technology - Security techniques - Random bit generation - Technical Corrigendum 1 INCITS/ISO/IEC 19637:2016[201x], Information technology - Sensor network testing framework INCITS/ISO/IEC 20648:2016[201x], Information technology - TLS specification for storage systems INCITS/ISO/IEC 24759:2017[201x], Information technology - Security techniques - Test requirements for cryptographic modules INCITS/ISO/IEC 25185-1:2016[201x], Identification cards - Integrated circuit card authentication protocols - Part 1: Protocol for Lightweight Authentication of Identity INCITS/ISO/IEC 27001:2013/COR 1:2014[201x], Information technology — Security techniques — Information security management systems — Requirements - Technical Corrigendum 1 INCITS/ISO/IEC 27001:2013/COR 2:2015[201x], Information technology - Security techniques - Information security management systems - Requirements - Technical Corrigendum 2 INCITS/ISO/IEC 27002:2013/COR 1:2014[201x], Information technology - Security techniques - Code of practice for information security controls - Technical Corrigendum 1 INCITS/ISO/IEC 27002:2013/COR 2:2015[201x], Information technology - Security techniques - Code of practice for information security controls - Technical Corrigendum 2 INCITS/ISO/IEC 27013:2015[201x], Information technology - Security techniques - Guidance on the integrated implementation of ISO/IEC 27001 and ISO/IEC 20000-1 INCITS/ISO/IEC 27034-2:2015[201x], Information technology - Security techniques - Application security - Part 2: Organization normative framework INCITS/ISO/IEC 27042:2015[201x], Information technology - Security techniques - Guidelines for the analysis and interpretation of digital evidence INCITS/ISO/IEC 29190:2015[201x], Information technology - Security techniques - Privacy capability assessment model INCITS/ISO/IEC 40314:2016[201x], Information technology - Mathematical Markup Language (MathML) Version 3.0 |
Document State | Public Review Register/Notices (Public Review Register/Notices) |
Group / Folder | Executive Board / EB Document Registers - Previous Years / EB Document Register 2018 |
Submitter | By Rachel Porter on Thursday, 08 February 2018 11:53am |
Modified | By Lynn Barra on Friday, 30 July 2021 07:46pm |
Public URL | https://standards.incits.org/apps/group_public/document.php?document_id=95451&wg_abbrev=eb |