Information security technology—Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals
Information security technology—General requirements for classified protection of cyber security—Part 2:Special security requirements for cloud computing