Skip to main content
Home

Main navigation

Collections Solutions Keep up to date

Support

  • Contact support
  • About Joinup
  • FAQ
  • How-To & video tutorials
  • Federation of solutions
  • Joinup & EU Login
  • Satisfaction survey

User account menu

  • Sign in with EU Login
  • More about EU Login

Main navigation mobile

Collections Solutions Keep up to date

Advanced search

Content types

  • Solutions (4)

Collection/Solution

  • Open Source Observatory (OSOR) (14)
  • eGovernment (11)
  • Open Government (10)
  • eHealth (7)
  • Education, culture and sport (4)
  • Free and open source software (4)
  • Geographic information system (GIS) software (4)
  • eInclusion (2)
  • Semantic Interoperability Community (SEMIC) (2)
  • Environment (1)
  • eProcurement (1)
  • European Committee for Standardization (CEN) (1)
  • sdcTools: Tools for Statistical Disclosure Control (1)
  • (-) ICT Standards for Procurement (4)

Topic

  • eProcurement (4)

Geographic coverage

  • (-) Antarctica (4)
  • Belgium (1)

ISO/IEC 15408-2:2008 - Information technology – Security techniques – Evaluation criteria for IT security – Part 2: Security functional components

solution

ISO/IEC 15408-1:2005 - Information technology – Security techniques – Evaluation criteria for IT security – Part 1: Introduction and general model

solution

ISO/IEC 19790:2012 - Information technology – Security techniques – Security requirements for cryptographic modules

solution

ISO/IEC 29190:2015 - Information technology – Security techniques – Privacy capability assessment model

solution

Home

v1.73.1

Follow us:

  • LinkedIn
  • Twitter
  • Joinup Newsletter

Footer menu

  • ADMS-AP Validator
  • Contact Joinup Support
  • About the Commission's new web presence
  • Resources for partners
  • Cookies
  • Legal notice
  • Contact
  • Europa Analytics