Back to Results
First PageMeta Content
Data security / ISO JTC 1/SC 27 / Computer security / ISO/IEC 27002 / ISO/IEC 27001 / ISO/IEC JTC1 / ISO/IEC 27006 / ISO/IEC 27007 / ISO/IEC 27000 / Computing / Security / Information technology management


ISO/IEC JTC 1 N 11370
Add to Reading List

Document Date: 2013-03-06 11:40:19


Open Document

File Size: 266,86 KB

Share Result on Facebook

City

Stockholm / Berlin / ACTION / Furthermore / /

Company

Personal Information Management Systems / MasterCard / The Trusted Computing Group / Publication / SG17 / SC 27 / /

Country

Germany / Sweden / United States / /

Currency

USD / /

/

Event

Business Partnership / /

IndustryTerm

supply chain / security incident management / context-aware computing bearing relation / identity management / information security management systems / interorganisational communications / authorization management technologies / e - business / removable media / information security management / management systems audits / communications technology / security management / telecommunication systems / software engineering processes / security technologies / incident management / technology area / security technology standards / asymmetric cryptographic algorithms / software vulnerability analysis / telecommunications / software target / intersector communications / context-aware computing / e-government / computing / event management / stream cipher algorithms / public cloud computing services / electronic services / security solutions / /

Organization

Data Protection Working Party / DIN Deutsches Institut für Normung / Common Criteria Development Board / EPC / United Nations / CCDB / Trusted Third Party / Food safety / INTERPOL / /

Person

Walter Fumy / M. De Soete / /

/

Position

General / secretary / Chairman 1 Management / Vice-Chair / Chairman / evaluator / /

Product

SC / TC / /

Technology

stream cipher algorithms / Encryption algorithms / Information technology / communications technology / secret key / encryption / security technologies / asymmetric cryptographic algorithms / 1 Information technology / authorization management technologies / /

URL

http /

SocialTag