HOME   Cart(1)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (17 Jan 2026)
Path: Home > GB/T > Page 210                                      Home > Standard_List > GB/T > Page 210
   

Chinese National Standard: GB/T

Previous << 210 >> Next
Std ID Description (Standard Title) Detail
GB/T 20277-2015 Information security technology -- Testing and evaluation approaches of network and terminal separation products GB/T 20277-2015
GB/T 20279-2015 Information security technology -- Security technical requirements of network and terminal separation products GB/T 20279-2015
GB/T 20281-2015 Information security technology -- Security technical requirements and testing and evaluation approaches for firewall GB/T 20281-2015
GB/T 31495.1-2015 Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 1: Concepts and model GB/T 31495.1-2015
GB/T 31495.2-2015 Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 2: Indicator system GB/T 31495.2-2015
GB/T 31495.3-2015 Information security technology -- Indicator system of information security assurance and evaluation methods -- Part 3: Implementation guide GB/T 31495.3-2015
GB/T 31496-2015 Information technology -- Security techniques -- Information security management system implementation guidance GB/T 31496-2015
GB/T 31497-2015 Information technology -- Security techniques -- Information security management -- Measurement GB/T 31497-2015
GB/T 31499-2015 Information security technology -- Technical requirements and testing and evaluation approaches for unified threat management products GB/T 31499-2015
GB/T 31500-2015 Information security technology -- Requirement of data recovery service for storage media GB/T 31500-2015
GB/T 31501-2015 Information security technology -- Authentication and authorization -- Specification for authorization application programming decision interface GB/T 31501-2015
GB/T 31502-2015 Information security technology -- Security protect framework of electronic payment system GB/T 31502-2015
GB/T 31503-2015 Information security technology -- Encryption and signature message syntax for electronic document GB/T 31503-2015
GB/T 31504-2015 Information security technology -- Authentication and authorization -- Digital identity information service framework specification GB/T 31504-2015
GB/T 31505-2015 [Replaced by GB/T 20281-2020] Information security technology -- Technique requirements and testing and evaluation approaches for host-based firewall and personal firewall GB/T 31505-2015
GB/T 31506-2015 Information security technology -- Security technology guidelines for web portal system of government GB/T 31506-2015
GB/T 31507-2015 Information security technology -- General testing guide for security of smart card GB/T 31507-2015
GB/T 31508-2015 Information security techniques -- Public key infrastructure -- Digital certificate policies classification and grading specification GB/T 31508-2015
GB/T 31509-2015 Information security technology - Guide of implementation for information security risk assessment GB/T 31509-2015
GB/T 31722-2015 Information technology -- Security techniques -- Information security risk management GB/T 31722-2015
GB/T 32213-2015 Information security technology -- Public key infrastructure -- Specification for remote password authentication and key establishment GB/T 32213-2015
GB/T 31167-2014 Information security technology -- Security guide of cloud computing services GB/T 31167-2014
GB/T 31168-2014 Information security technology -- Security capability requirements of cloud computing services GB/T 31168-2014
GB/T 20275-2013 Information security technology -- Technical requirements and testing and evaluation approaches for network-based intrusion detection system GB/T 20275-2013
GB/T 20278-2013 Information security technology -- Security technical requirements for network vulnerability scanners GB/T 20278-2013
GB/T 20945-2013 Information security technology -- Technical requirements, testing and evaluation approaches for information system security audit product GB/T 20945-2013
GB/T 29765-2013 Information security technology -- Technical requirements and testing and evaluating method for data backup and recovery products GB/T 29765-2013
GB/T 29766-2013 Information security technology -- Technical requirements and testing and evaluating approaches of website data recovery products GB/T 29766-2013
GB/T 29767-2013 Information security techniques -- Public key infrastructure -- Bridge Certification Authority leveled certificate specification GB/T 29767-2013
GB/T 29828-2013 Information security technology -- Trusted computing specification -- Trusted connect architecture GB/T 29828-2013
GB/T 29829-2013 Information security techniques -- Functionality and interface specification of cryptographic support platform for trusted computing GB/T 29829-2013
GB/T 30270-2013 Information technology -- Security technology -- Methodology for IT security evaluation GB/T 30270-2013
GB/T 30271-2013 Information security technology -- Assessment criteria for information security service capability GB/T 30271-2013
GB/T 30272-2013 Information security technology -- Public Key Infrastructure -- Testing and evaluation guide on standard conformance GB/T 30272-2013
GB/T 30273-2013 Information security technology -- Common methodology for information systems security assurance evaluation GB/T 30273-2013
GB/T 30274-2013 Information security techniques -- Public Key Infrastructure -- Specification of testing on application interfaces of electronic signature card GB/T 30274-2013
GB/T 30275-2013 Information security technology -- Authentication and authorization -- Authentication middleware framework and interface specification GB/T 30275-2013
GB/T 30276-2013 Information security technology -- Vulnerability management criterion specification GB/T 30276-2013
GB/T 30277-2013 Information security technology -- Public key infrastructures -- Certification authentication institution identity code specification GB/T 30277-2013
GB/T 30278-2013 Information security technology -- Chinese government desktop core configuration specifications GB/T 30278-2013
GB/T 30279-2013 Information security technology -- Vulnerability classification guide GB/T 30279-2013
GB/T 30280-2013 Information security technology -- Authentication and authorization -- Geospatial eXtensible Access Control Markup Language (GeoXACML) GB/T 30280-2013
GB/T 30281-2013 Information security technology - Authentication and authorization. eXtensible Access Control Markup Language (XACML) GB/T 30281-2013
GB/T 30282-2013 Information security technology -- Techniques requirements and testing and evaluation approaches for anti-spam product GB/T 30282-2013
GB/T 30283-2013 Information security technology -- Information security service -- Category GB/T 30283-2013
GB/T 30284-2013 Technical requirements of security for operating system in smart mobile terminal (EAL2) GB/T 30284-2013
GB/T 30285-2013 Information security technology -- Construction and sustain management specifications of disaster recovery center GB/T 30285-2013
GB/T 15852.2-2012 Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 2: Mechanisms using a dedicated hash-function GB/T 15852.2-2012
GB/T 25068.1-2012 Information technology -- Security techniques -- IT network security -- Part 1: Network security management GB/T 25068.1-2012
GB/T 25068.2-2012 Information technology -- Security techniques -- IT network security -- Part 2: Network security architecture GB/T 25068.2-2012
GB/T 28447-2012 Information security technology -- Specification on the operation management of a certificate authority GB/T 28447-2012
GB/T 28448-2012 Information security technology -- Testing and evaluation requirement for classified protection of information system GB/T 28448-2012
GB/T 28449-2012 Information security technology -- Testing and evaluation process guide for classified protection of information system security GB/T 28449-2012
GB/T 28450-2012 Information security technology -- Guidelines for information security management system auditing GB/T 28450-2012
GB/T 28451-2012 Information security technology -- Technical requirements and testing and evaluation approaches for network-based intrusion prevention system products GB/T 28451-2012
GB/T 28452-2012 Information security technology -- Common security technique requirement for application software system GB/T 28452-2012
GB/T 28453-2012 Information security technology -- Information system security management assessment requirements GB/T 28453-2012
GB/T 28454-2012 Information technology -- Security techniques -- Selection, deployment and operations of intrusion detection systems GB/T 28454-2012
GB/T 28455-2012 Information security technology -- Entity authentication involving a trusted third party and access architecture specification GB/T 28455-2012
GB/T 28456-2012 Testing specification for applications of IPsec protocol GB/T 28456-2012
GB/T 28457-2012 Testing specification for applications of SSL protocol GB/T 28457-2012
GB/T 28458-2012 Information security technology -- Vulnerability identification and description specification GB/T 28458-2012
GB/T 29240-2012 Information security technology -- General security technique requirements and testing and evaluation method for terminal computer GB/T 29240-2012
GB/T 29241-2012 Information security technology -- Public key infrastructure -- PKI interoperability evaluation criteria GB/T 29241-2012
GB/T 29242-2012 Information security technology -- Authentication and authorization -- Security assertion markup language GB/T 29242-2012
GB/T 29243-2012 Information security technology -- Specifications of delegated certification path construction and delegated validation for digital certificate GB/T 29243-2012
GB/T 29244-2012 Information security technology -- Basic security requirements for office devices GB/T 29244-2012
GB/T 29245-2012 Information security techniques -- Basic requirements of information security for national department GB/T 29245-2012
GB/T 29246-2012 Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary GB/T 29246-2012
GB/T 26855-2011 Information security technology -- Public key infrastructure -- Certificate policy and certification practice statement framework GB/T 26855-2011
GB/T 25055-2010 Information security techniques -- Public key infrastructure security supporting platform framework GB/T 25055-2010
GB/T 25056-2010 Information security techniques -- Specifications of cryptograph and related security technology for certificate authentication system GB/T 25056-2010
GB/T 25057-2010 Information security techniques -- Public key infrastructure -- Specification of application interface of electronic signature card GB/T 25057-2010
GB/T 25058-2010 Information security technology -- Implementation guide for classified protection of information system GB/T 25058-2010
GB/T 25059-2010 Information security technology -- Public key infrastructure -- Simple online certificate status protocol GB/T 25059-2010
GB/T 25060-2010 Information security techniques -- Public key infrastructure -- Interface specification of X.509 digital certificates application GB/T 25060-2010
GB/T 25061-2010 Information security technology -- Public key infrastructure -- XML digital signature syntax and processing specification GB/T 25061-2010
GB/T 25062-2010 Information security technology -- Authentication and authorization -- Role-based access control model and management specification GB/T 25062-2010
GB/T 25063-2010 Information security technology -- Testing and evaluation requirement for server security GB/T 25063-2010
GB/T 25064-2010 Information security technology - Public key infrastructure - Electronic signature formats specification GB/T 25064-2010
GB/T 25065-2010 Information security technology -- Public key infrastructure -- Security requirements for signature creation applications GB/T 25065-2010
GB/T 25066-2010 Information security technology -- Type and code of information security product GB/T 25066-2010
GB/T 25067-2010 Information technology -- Security techniques -- Requirements for bodies providing audit and certification of information security management systems GB/T 25067-2010
GB/T 25068.3-2010 Information technology -- Security techniques -- IT network security -- Part 3: Securing communications between networks using security gateways GB/T 25068.3-2010
GB/T 25068.4-2010 Information technology -- Security techniques -- IT network security -- Part 4: Securing remote access GB/T 25068.4-2010
GB/T 25068.5-2010 Information technology -- Security techniques -- IT network security -- Part 5: Securing communications across networks using virtual private networks GB/T 25068.5-2010
GB/T 25069-2010 Information security technology - Glossary GB/T 25069-2010
GB/T 25070-2010 Information security technology -- Technical requirements of security design for information system classified protection GB/T 25070-2010
GB/T 24363-2009 Information security technology -- Specifications of emergency response plan for information security GB/T 24363-2009
GB/T 20274.2-2008 Information security technology -- Evaluation framework for information systems security assurance -- Part 2: Technical assurance GB/T 20274.2-2008
GB/T 20274.3-2008 Information security technology -- Evaluation framework for information systems security assurance -- Part 3: Management assurance GB/T 20274.3-2008
GB/T 20274.4-2008 Information security technology -- Evaluation framework for information systems security assurance -- Part 4: Engineering assurance GB/T 20274.4-2008
GB/T 22239-2008 Information security technology -- Baseline for classified protection of information system security GB/T 22239-2008
GB/T 15843.1-2008 Information technology -- Security techniques -- Entity authentication -- Part 1: General GB/T 15843.1-2008
GB/T 15843.2-2008 Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithm GB/T 15843.2-2008
GB/T 15843.3-2008 Information technology -- Security techniques -- Entity authentication -- Part 3: Mechanisms using digital signature techniques GB/T 15843.3-2008
GB/T 15843.4-2008 Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function GB/T 15843.4-2008
GB/T 15852.1-2008 Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher GB/T 15852.1-2008
GB/T 17903.1-2008 Information technology -- Security techniques -- Non-repudiation -- Part 1: General GB/T 17903.1-2008
GB/T 17903.2-2008 Information technology -- Security techniques -- Non-repudiation -- Part 2: Mechanisms using symmetric techniques GB/T 17903.2-2008
Previous << 210 >> Next

Refund Policy     Privacy Policy     Terms of Service     Shipping Policy     Contact Information