【国际标准】 Information security, cybersecurity and privacy protection - A framework for identity management - Part 2: Reference architecture and requirements
本网站 发布时间:
2025-11-26
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>
适用范围:
暂无
标准号:
ISO/IEC 24760-2:2025 EN
标准名称:
Information security, cybersecurity and privacy protection - A framework for identity management - Part 2: Reference architecture and requirements
英文名称:
Information security, cybersecurity and privacy protection - A framework for identity management - Part 2: Reference architecture and requirements标准状态:
现行-
发布日期:
2025-09-16 -
实施日期:
出版语种:
EN
- 其它标准
- 上一篇: IEC 61249-2-52:2025 EN-FR 0a361f86 Materials for printed boards and other interconnecting structures - Part 2-52: Reinforced base materials clad and unclad - Thermosetting hydrocarbon resin system, woven E-glass reinforced laminate sheets of defined flammability (vertical burning test), copper-clad
- 下一篇: IEC 61000-4-27:2000/AMD2:2025 EN 0b33235b Amendment 2 - Electromagnetic compatibility (EMC) - Part 4-27: Testing and measurement techniques – Unbalance, immunity test for equipment with input current not exceeding 16 A per phase
- 推荐标准
- IEC 62443-3-2:2020 EN d294ffd6 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-3-2:2020 EN-FR 84209ce0 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-4-2:2019 EN-FR 793760b3 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
- ISO 23257:2022 EN 34ace5ae Blockchain and distributed ledger technologies — Reference architecture
- ISO/IEC 10116:2017 EN a4e13788 Information technology - Security techniques - Modes of operation for an n-bit block cipher
- ISO/IEC 10118-1:2016/Amd 1:2021 EN 8aa8994b Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1: Padding methods for sponge functions
- ISO/IEC 10118-4:1998 EN fdfbdbed Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
- ISO/IEC 10118-4:1998/Amd 1:2014 EN 922246ae Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers
- ISO/IEC 11770-3:2015/AMD1:2017 EN a15284c6 Amendment 1 - Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques - Blinded Diffie-Hellman key agreement
- ISO/IEC 11770-3:2021 EN 67617351 Information security - Key management - Part 3: Mechanisms using asymmetric techniques
- ISO/IEC 11770-4:2017 EN 7498fd5a Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
- ISO/IEC 11770-4:2017/AMD2:2021 EN 0f66ccc6 Amendment 2 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Leakage-resilient password-authenticated key agreement with additional stored secrets
- ISO/IEC 11770-6:2016 EN c2fa2fe3 Information technology — Security techniques — Key management — Part 6: Key derivation
- ISO/IEC 11770-7:2021 EN f41fed1a Information security — Key management — Part 7: Cross-domain password-based authenticated key exchange
- ISO/IEC 13888-1:2020 EN 3714ed9b Information security — Non-repudiation — Part 1: General
我的标准
购物车
400-168-0010










