Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology — Physical network security for the accommodation of customer premises cabling infrastructure and information technology equipment
10.99 New project approved
Information technology — Programming languages — Guidance for the use of the Ada Ravenscar Profile in high integrity systems
60.00 Standard under publication
Systems and software engineering — Life cycle management — Part 10: Guidelines for systems engineering agility
40.00 DIS registered
Systems and software engineering — Life cycle management — Part 4: Systems engineering management planning
40.00 DIS registered
Systems and software engineering — Life cycle management — Part 7: Application of systems engineering on defense programs
40.00 DIS registered
Information security, cybersecurity and privacy protection — Test requirements for cryptographic modules
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 1: Core concepts and terminology
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 2: Reference architecture and requirements
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 3: Practice
50.20 Proof sent to secretariat or FDIS ballot initiated: 8 weeks
IT Security and Privacy — A framework for identity management — Part 4: Authenticators, Credentials and Authentication
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 10: Vulnerability descriptions for programming language C++
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 11: Vulnerability descriptions for programming language Java
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 4: Vulnerability descriptions for the programming language Python
20.60 Close of comment period
Programming languages — Avoiding vulnerabilities in programming languages — Part 6: Vulnerability descriptions for programming language SPARK
20.60 Close of comment period
Information technology — Programming languages — Guidance to avoiding vulnerabilities in programming languages — Part 8: Catalogue of vulnerabilities for the programming language Fortran
10.20 New project ballot initiated
Information technology — Radio frequency identification (RFID) for item management — Software system infrastructure — Part 5: Device interface
40.60 Close of voting
Study and review of authenticate encryption mechanisms for the future revisions of standards
00.00 Proposal for new project received