Standard No. |
Title |
Price(USD) |
Delivery |
Status |
Add To Cart |
GB/Z 28828-2012 |
Information security technology - Guideline for personal information protection within information system for public and commercial services |
180 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/Z 24294.2-2017 |
Information security technology—Guide of implementation for Internet-basede-government information security—Part 2:Access control and secure exchange |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 35285-2017 |
Information security technology—Public key infrastructure—Technical requirements for digital certificate based reliable electronic signature creation and verification |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 29242-2012 |
Information security technology—Authentication and authorization—Security assertion markup language |
1080 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 35289-2017 |
Information security technology—Specification on the service quality of certification authority |
420 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 15851.3-2018 |
Information technology—Security techniques—Digital signature schemes giving message recovery—Part 3:Discrete logarithm based mechanisms |
840 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 37092-2018 |
Information security technology—Security requirements for cryptographic modules |
780 (USD) |
via email in
1-8 business day
|
VALID
|
|
GB/T 31503-2015 |
Information security technology—Encryption and signature message syntax for electronic document |
600 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 36960-2018 |
Information security technology—Authentication and authorization—Access control middleware framework and interface |
660 (USD) |
via email in
1-5 business day
|
VALID
|
|
GB/T 37988-2019 |
Information security technology-Data security capability maturity model |
900 (USD) |
via email in
1 business day
|
VALID
|
|
GB/Z 24294.4-2017 |
Information security technology—Guide of implementation for Internet-based e-government information security—Part 4:Defense for terminal security |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36630.5-2018 |
Information security technology—Controllability evaluation index for security of information technology products—Part 5:General purpose computer |
240 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 36643-2018 |
Information security technology—Cyber security threat information format |
540 (USD) |
via email in
1-5 business day
|
VALID
|
|
GA/T 1540-2018 |
Information security technology—Testing and evaluation criteria for personal mobile terminal security management products |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 30284-2020 |
Information security techniques—Security technical requirements for operating system on smart mobile terminal |
780 (USD) |
via email in
1-8 business day
|
TO BE VALID
|
|
GB/T 29246-2012 |
Information technology—Security techniques—Information security management systems—Overview and vocabulary |
360 (USD) |
via email in
1-3 business day
|
ABOLISHED
|
|
GB/T 36324-2018 |
Information security technology—Information security classification specifications of industrial control systems |
480 (USD) |
via email in
1-5 business day
|
VALID
|
|
YD/T 1132-2001 |
Specification requirement for firewall products |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GB/T 37093-2018 |
Information security technology—Security requirements for IoT sensing layer access to communication network |
300 (USD) |
via email in
1-3 business day
|
VALID
|
|
GM/T 0073-2019 |
Cryptography technical requirements for mobile banking information systems |
|
via email in
|
VALID
|
please email coc@codeofchina.com for quotation
|
|