Search Standards
Loading facets. please wait
(54)
(0)
(0)
(54)
(0)
(52)
(1)
(1)
(0)
(0)
(0)
(0)
(0)
(0)
(0)
Filtering your results. please wait...
GSO ISO/TS 23635:2024
ISO/TS 23635:2022
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance
GSO ISO/IEC 27556:2024
ISO/IEC 27556:2022
Gulf Standard
Information security, cybersecurity and privacy protection — User-centric privacy preferences management framework
GSO ISO/IEC 27099:2024
ISO/IEC 27099:2022
Gulf Standard
Information technology — Public key infrastructure — Practices and policy framework
GSO ISO/IEC 29184:2023
ISO/IEC 29184:2020
Gulf Standard
Information technology — Online privacy notices and consent
GSO ISO/IEC 27011:2023
ISO/IEC 27011:2016
Gulf Standard
Information technology — Security techniques — Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations
GSO ISO/IEC 18370-1:2023
ISO/IEC 18370-1:2016
Gulf Standard
Information technology — Security techniques — Blind digital signatures — Part 1: General
GSO ISO/IEC 19989-2:2023
ISO/IEC 19989-2:2020
Gulf Standard
Information security — Criteria and methodology for security evaluation of biometric systems — Part 2: Biometric recognition performance
GSO ISO/IEC 19989-1:2023
ISO/IEC 19989-1:2020
Gulf Standard
Information security — Criteria and methodology for security evaluation of biometric systems — Part 1: Framework
GSO ISO/IEC 11770-7:2023
ISO/IEC 11770-7:2021
Gulf Standard
Information security — Key management — Part 7: Cross-domain password-based authenticated key exchange
GSO ISO/IEC 18367:2023
ISO/IEC 18367:2016
Gulf Standard
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
GSO ISO/IEC 19989-3:2023
ISO/IEC 19989-3:2020
Gulf Standard
Information security — Criteria and methodology for security evaluation of biometric systems — Part 3: Presentation attack detection
GSO ISO/IEC 27000:2023
ISO/IEC 27000:2018
Gulf Standard
Information technology — Security techniques — Information security management systems — Overview and vocabulary