Information security technology—General requirements for classified protection of cyber security—Part 2:Special security requirements for cloud computing
Information security technology—Security technical requirements and testing and evaluation approaches for application software of smart mobile terminals