X.1
|
International user classes of service in, and categories of access to, public data networks and Integrated Services Digital Networks (ISDNs)
�
|
X.2
|
International data transmission services and optional user facilities in public data networks and ISDNs
�
|
X.3
|
Packet Assembly/Disassembly facility (PAD) in a public data network
�
|
X.4
|
General structure of signals of International Alphabet No. 5 code for character oriented data transmission over public data networks
�
|
X.5
|
Facsimile Packet Assembly/Disassembly facility (FPAD) in a public data network
�
|
X.6
|
Multicast service definition
�
|
X.7
|
Technical characteristics of data transmission services
�
|
X.8
|
Multi-aspect PAD (MAP) framework and service definition
�
|
X.10
|
[Withdrawn] Categories of access for Data Terminal Equipment (DTE) to public data transmission services
� Deleted as its content is fully covered by ITU-T X.1
|
X.15
|
[Withdrawn] Definitions of terms concerning public data networks
� Withdrawn on 25.11.1988
|
X.20
|
Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for start-stop transmission services on public data networks
�
|
X.20bis
|
Use on public data networks of Data Terminal Equipment (DTE) which is designed for interfacing to asynchronous duplex V-Series modems
�
|
X.21
|
Interface between Data Terminal Equipment and Data Circuit-terminating Equipment for synchronous operation on public data networks
�
|
X.21bis
|
Use on public data networks of Data Terminal Equipment (DTE) which is designed for interfacing to synchronous V-Series modems
�
|
X.22
|
Multiplex DTE/DCE interface for user classes 3-6
�
|
X.24
|
List of definitions for interchange circuits between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) on public data networks
�
|
X.25
|
Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and connected to public data networks by dedicated circuit
�
|
X.26
|
Electrical characteristics for unbalanced double-current interchange circuits operating at data signalling rates nominally up to 100 kbit/s
� This Recommendation is published under alias number V.10
|
X.27
|
Electrical characteristics for balanced double-current interchange circuits operating at data signalling rates up to 10 Mbit/s
� This Recommendation is published under alias number V.11
|
X.28
|
DTE/DCE interface for a start-stop mode Data Terminal Equipment accessing the Packet Assembly/Disassembly facility (PAD) in a public data network situated in the same country
�
|
X.29
|
Procedures for the exchange of control information and user data between a Packet Assembly/Disassembly (PAD) facility and a packet mode DTE or another PAD
�
|
X.30
|
Support of X.21, X.21 bis and X.20 bis based Data Terminal Equipments (DTEs) by an Integrated Services Digital Network (ISDN)
� This Recommendation is also included but not published in I series under alias number I.461
|
X.31
|
Support of packet mode terminal equipment by an ISDN
� This Recommendation is also included but not published in I series under alias number I.462
|
X.32
|
Interface between Data terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and accessing a Packet-Switched Public Data Network through a public switched telephone network or an Integrated Services Digital Network or a Circuit-Switched Public Data Network
�
|
X.33
|
Access to packet-switched data transmission services via frame relaying data transmission services
�
|
X.34
|
Access to packet-switched data transmission services via B-ISDN
�
|
X.35
|
Interface between a PSPDN and a private PSDN which is based on X.25 procedures and enhancements to define a gateway function that is provided in the PSPDN
�
|
X.36
|
Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for public data networks providing frame relay data transmission service by dedicated circuit
�
|
X.37
|
Encapsulation in X.25 packets of various protocols including frame relay
�
|
X.38
|
G3 facsimile equipment/DCE interface for G3 facsimile equipment accessing the Facsimile Packet Assembly/Disassembly facility (FPAD) in a public data network situated in the same country
�
|
X.39
|
Procedures for the exchange of control information and user data between a Facsimile Packet Assembly/Disassembly (FPAD) facility and a packet mode Data Terminal Equipment (DTE) or another FPAD
�
|
X.40
|
[Withdrawn] Standardization of frequency-shift modulated transmission systems for the provision of telegraph and data channels by frequency division of a group
� Withdrawn on 12.03.1993
|
X.42
|
Procedures and methods for accessing a public data network from a DTE operating under control of a generalized polling protocol
�
|
X.45
|
Interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for terminals operating in the packet mode and connected to public data networks, designed for efficiency at higher speeds
�
|
X.46
|
Access to FRDTS via B-ISDN
�
|
X.48
|
Procedures for the provision of a basic multicast service for data terminal equipments (DTEs) using Recommendation X.25
�
|
X.49
|
Procedures for the provision of an extended multicast service for data terminal equipments (DTEs) using Recommendation X.25
�
|
X.50
|
Fundamental parameters of a multiplexing scheme for the international interface between synchronous data networks
�
|
X.50bis
|
Fundamental parameters of a 48-kbit/s user data signalling rate transmission scheme for the international interface between synchronous data networks
�
|
X.51
|
Fundamental parameters of a multiplexing scheme for the international interface between synchronous data networks using 10-bit envelope structure
�
|
X.51bis
|
Fundamental parameters of a 48-kbit/s user data signalling rate transmission scheme for the international interface between synchronous data networks using 10-bit envelope structure
�
|
X.52
|
Method of encoding anisochronous signals into a synchronous user bearer
�
|
X.53
|
Numbering of channels on international multiplex links at 64 kbit/s
�
|
X.54
|
Allocation of channels on international multiplex links at 64 kbit/s
�
|
X.55
|
Interface between synchronous data networks using a 6 + 2 envelope structure and single channel per carrier (SCPC) satellite channels
�
|
X.56
|
Interface between synchronous data networks using an 8 + 2 envelope structure and single channel per carrier (SCPC) satellite channels
�
|
X.57
|
Method of transmitting a single lower speed data channel on a 64 kbit/s data stream
�
|
X.58
|
Fundamental parameters of a multiplexing scheme for the international interface between synchronous non-switched data networks using no envelope structure
�
|
X.60
|
Common channel signalling for circuit-switched data applications
�
|
X.61
|
[Withdrawn] Signalling System No. 7 - Data user part
� This Recommendation is also included but not published in Q series under alias number Q.741
|
X.70
|
Terminal and transit control signalling system for start-stop services on international circuits between anisochronous data networks
�
|
X.71
|
Decentralized terminal and transit control signalling system on international circuits between synchronous data networks
�
|
X.75
|
Packet-switched signalling system between public networks providing data transmission services
�
|
X.76
|
Network-to-network interface between public networks providing PVC and/or SVC frame relay data transmission service
�
|
X.77
|
Interworking between PSPDNs via B-ISDN
�
|
X.78
|
Interworking procedures between networks providing frame relay data transmission services via B-ISDN
�
|
X.80
|
Interworking of interexchange signalling systems for circuit-switched data services
�
|
X.81
|
Interworking between an ISDN circuit-switched and a circuit-switched public data network (CSPDN)
�
|
X.82
|
Detailed arrangements for interworking between CSPDNs and PSPDNs based on Recommendation T.70
�
|
X.84
|
Support of frame relay services over MPLS core networks
�
|
X.85
|
IP over SDH using LAPS
�
|
X.86
|
Ethernet over LAPS
�
|
X.87
|
Multiple services ring based on RPR
�
|
X.92
|
Hypothetical reference connections for public synchronous data networks
�
|
X.96
|
Call progress signals in public data networks
�
|
X.110
|
International routing principles and routing plan for Public Data Networks
�
|
X.111
|
Principles for the routing of international frame relay traffic
�
|
X.115
|
Definition of address translation capability in public data networks
�
|
X.116
|
Address translation registration and resolution protocol
�
|
X.121
|
International numbering plan for public data networks
�
|
X.122
|
Numbering plan interworking for the E.164 and X.121 numbering plans
� This Recommendation is published with the double number E.166 and X.122. For more details see E.166
|
X.123
|
Mapping between escape codes and TOA/NPI for E.164/X.121 numbering plan interworking during the transition period
�
|
X.124
|
Arrangements for the interworking of the E.164 and X.121 numbering plans for frame relay and ATM networks
�
|
X.125
|
Procedure for the notification of the assignment of international network identification codes for public frame relay data networks and ATM networks numbered under the E.164 numbering plan
�
|
X.130
|
Call processing delays in public data networks when providing international synchronous circuit-switched data services
�
|
X.131
|
Call blocking in public data networks when providing international synchronous circuit-switched data services
�
|
X.134
|
Portion boundaries and packet-layer reference events: basis for defining packet-switched performance parameters
�
|
X.135
|
Speed of service (delay and throughput) performance values for public data networks when providing international packet-switched services
�
|
X.136
|
Accuracy and dependability performance values for public data networks when providing international packet-switched services
�
|
X.137
|
Availability performance values for public data networks when providing international packet-switched services
�
|
X.138
|
Measurement of performance values for public data networks when providing international packet-switched services
�
|
X.139
|
Echo, drop, generator and test DTEs for measurement of performance values in public data networks when providing international packet-switched services
�
|
X.140
|
General quality of service parameters for communication via public data networks
�
|
X.141
|
General principles for the detection and correction of errors in public data networks
� A Corrigendum was indicated in 06/1990 for the English version.
|
X.142
|
Quality of service metrics for characterizing Frame Relay/ATM service interworking performance
�
|
X.144
|
User information transfer performance parameters for public frame relay data networks
�
|
X.145
|
Connection establishment and disengagement performance parameters for public Frame Relay data networks providing SVC services
�
|
X.146
|
Performance objectives and quality of service classes applicable to frame relay
�
|
X.147
|
Frame Relay network availability
�
|
X.148
|
Procedures for the measurement of the performance of public data networks providing the international frame relay service
�
|
X.149
|
Performance of IP networks when supported by public Frame Relay data networks
�
|
X.150
|
Principles of maintenance testing for public data networks using Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) test loops
�
|
X.151
|
Frame Relay operations and maintenance - Principles and functions
�
|
X.Imp160
|
Customer Network Management Implementors' Guide - Defects and Resolutions
�
|
X.160
|
Architecture for customer network management service for public data networks
�
|
X.161
|
Definition of customer network management services for public data networks
�
|
X.162
|
Definition of management information for customer network management service for public data networks to be used with the CNMc interface
�
|
X.163
|
Definition of management information for customer network management service for public data networks to be used with the CNMe interface
�
|
X.170
|
Network-network management architecture for data networks
�
|
X.171
|
Network-network management services for data networks
�
|
X.180
|
Administrative arrangements for international closed user groups (CUGs)
�
|
X.181
|
Administrative arrangements for the provision of international permanent virtual circuits (PVCs)
�
|
X.200
|
Information technology - Open Systems Interconnection - Basic Reference Model: The basic model
�
|
X.Imp200
|
OSI Implementers' Guide - Version 1.1
�
|
X.207
|
Information technology - Open Systems Interconnection - Application layer structure
�
|
X.208
|
[Withdrawn] Specification of Abstract Syntax Notation One (ASN.1)
�
|
X.209
|
[Withdrawn] Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)
�
|
X.210
|
Information technology - Open Systems Interconnection - Basic Reference Model: Conventions for the definition of OSI services
�
|
X.211
|
Information technology - Open Systems Interconnection - Physical service definition
�
|
X.212
|
Information technology - Open Systems Interconnection - Data Link service definition
�
|
X.213
|
Information technology - Open Systems Interconnection - Network service definition
�
|
X.214
|
Information technology - Open Systems Interconnection -Transport service definition
�
|
X.215
|
Information technology - Open Systems Interconnection - Session service definition
�
|
X.216
|
Information technology - Open Systems Interconnection - Presentation service definition
�
|
X.217
|
Information technology - Open Systems Interconnection - Service definition for the Association Control Service Element
�
|
X.217bis
|
Information technology - Open Systems Interconnection - Service definition for the Application Service Object Association Control Service Element
�
|
X.218
|
Reliable Transfer: Model and service definition
�
|
X.219
|
Remote Operations: Model, notation and service definition
�
|
X.220
|
Use of X.200-Series protocols in CCITT applications
�
|
X.222
|
Use of X.25 LAPB-compatible Data Link procedures to provide the OSI connection-mode Data Link service
� This title results from the modification of ITU-T X.222 (04/95) former title by Amendment 1 (10/96).
|
X.223
|
Use of X.25 to provide the OSI connection-mode Network service for ITU-T applications
�
|
X.224
|
Information technology - Open Systems Interconnection - Protocol for providing the connection-mode transport service
�
|
X.225
|
Information technology - Open Systems Interconnection - Connection-oriented Session protocol: Protocol specification
�
|
X.226
|
Information technology - Open Systems Interconnection - Connection-oriented Presentation protocol: Protocol specification
�
|
X.227
|
Information technology - Open Systems Interconnection - Connection-oriented protocol for the Association Control Service Element: Protocol specification
�
|
X.227bis
|
Information technology - Open Systems Interconnection - Connection-mode protocol for the Application Service Object Association Control Service Element
�
|
X.228
|
Reliable Transfer: Protocol specification
�
|
X.229
|
Remote Operations: Protocol specification
�
|
X.233
|
Information technology - Protocol for providing the connectionless-mode network service: Protocol specification
�
|
X.234
|
Information technology - Protocol for providing the OSI connectionless-mode transport service
�
|
X.235
|
Information technology - Open Systems Interconnection - Connectionless Session protocol: Protocol specification
�
|
X.236
|
Information technology - Open Systems Interconnection - Connectionless Presentation protocol: Protocol specification
�
|
X.237
|
Information technology - Open Systems Interconnection - Connectionless protocol for the Association Control Service Element: Protocol specification
�
|
X.237bis
|
Information technology - Open Systems Interconnection - Connectionless protocol for the Application Service Object Association Control Service Element
�
|
X.244
|
[Withdrawn] Procedure for the exchange of protocol identification during virtual call establishment on Packet Switched Public Data Networks
� Superseded by the more comprehensive description of protocol identifiers contained in X.263
|
X.245
|
Information technology - Open Systems Interconnection - Connection-oriented Session protocol: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.246
|
Information technology - Open Systems Interconnection - Connection-oriented Presentation protocol: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.247
|
Information technology - Open Systems Interconnection - Protocol specification for the Association Control Service Element: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.248
|
Information technology - Open Systems Interconnection - Reliable Transfer: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.249
|
Information technology - Open Systems Interconnection - Remote Operations: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.255
|
Information technology - Open Systems Interconnection - Connectionless Session protocol: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.256
|
Information technology - Open Systems Interconnection - Connectionless Presentation protocol: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.257
|
Information technology - Open Systems Interconnection - Connectionless protocol for the Association Control Service Element: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.260
|
Information technology - Framework for protocol identification and encapsulation
�
|
X.263
|
Information technology - Protocol identification in the Network Layer
�
|
X.264
|
Transport protocol identification mechanism
�
|
X.272
|
Data compression and privacy over frame relay networks
�
|
X.273
|
Information technology - Open Systems Interconnection - Network layer security protocol
�
|
X.274
|
Information technology - Telecommunication and information exchange between systems - Transport layer security protocol
�
|
X.281
|
Information technology - Elements of management information related to the OSI Physical Layer
�
|
X.282
|
Elements of management information related to the OSI Data Link layer
�
|
X.283
|
Information technology - Elements of management information related to the OSI Network layer
�
|
X.284
|
Information technology - Elements of management information related to the OSI Transport layer
�
|
X.287
|
Information technology - Open Systems Interconnection - Structure of management information: Managed objects for supporting upper layers
�
|
X.290
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - General concepts
�
|
X.291
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Abstract test suite specification
�
|
X.292
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - The Tree and Tabular Combined Notation (TTCN)
�
|
X.293
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Test realization
�
|
X.294
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Requirements on test laboratories and clients for the conformance assessment process
�
|
X.295
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Protocol profile test specification
�
|
X.296
|
OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Implementation conformance statements
�
|
X.300
|
General principles for interworking between public networks and between public networks and other networks for the provision of data transmission services
�
|
X.301
|
Description of the general arrangements for call control within a subnetwork and between subnetworks for the provision of data transmission services
�
|
X.302
|
Description of the general arrangements for internal network utilities within a subnetwork and intermediate utilities between subnetworks for the provision of data transmission services
�
|
X.305
|
Functionalities of subnetworks relating to the support of the OSI connection-mode network service
�
|
X.320
|
General arrangements for interworking between Integrated Services Digital Networks (ISDNs) for the provision of data transmission services
�
|
X.321
|
General arrangements for interworking between Circuit-Switched Public Data Networks (CSPDNs) and Integrated Services Digital Networks (ISDNs) for the provision of data transmission services
� This Recommendation is also included but not published in I series under alias number I.540
|
X.322
|
General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and Circuit-Switched Public Data Networks (CSPDNs) for the provision of data transmission services
�
|
X.323
|
General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs)
�
|
X.324
|
General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and public mobile systems for the provision of data transmission services
�
|
X.325
|
General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and Integrated Services Digital Networks (ISDNs) for the provision of data transmission services
� This Recommendation is also included but not published in I series under alias number I.550
|
X.326
|
General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and Common Channel Signalling Network (CCSN)
�
|
X.327
|
General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and private data networks for the provision of data transmission services
�
|
X.328
|
General arrangements for interworking between Public Data Networks providing frame relay data transmission services and Integrated Services Digital Networks (ISDNs) for the provision of data transmission services
�
|
X.329
|
General arrangements for interworking between networks providing frame relay data transmission services and B-ISDN
�
|
X.340
|
General arrangements for interworking between a Packet-Switched Public Data Network (PSPDN) and the international telex network
�
|
X.350
|
General interworking requirements to be met for data transmission in international public mobile satellite systems
�
|
X.351
|
Special requirements to be met for Packet Assembly/Disassembly facilities (PADs) located at or in association with coast earth stations in the public mobile satellite service
�
|
X.352
|
Interworking between Packet-Switched Public Data Networks and public maritime mobile satellite data transmission systems
�
|
X.353
|
Routing principles for interconnecting public maritime mobile satellite data transmission systems with public data networks
�
|
X.361
|
Connection of VSAT systems with Packet-Switched Public Data Networks based on X.25 procedures
�
|
X.370
|
[Withdrawn] Arrangements for the transfer of internetwork management information
� Deleted because it was such a general Recommendation that it served no useful practical purpose
|
X.371
|
General arrangements for interworking between Public Data Networks and the Internet
�
|
X.400
|
Message handling services: Message handling system and service overview
�
|
X.Imp400
|
MHS Implementors' Guide
�
|
X.402
|
Information technology - Message Handling Systems (MHS): Overall architecture
�
|
X.403
|
[Withdrawn] Message handling systems: conformance testing
� This Recommendation was withdrawn because conformance testing concepts and methods defined in it were related to the 1984 MHS Recommendations and were not aligned with either the first or second versions of conformance testing standards. ITU-T X.480 (1992) refers to the 1988 "Blue Book" MHS Recommendations and was better aligned with the testing standards
|
X.404
|
Information technology - Message Handling Systems (MHS): MHS routing - Guide for messaging systems managers
�
|
X.407
|
[Withdrawn] Message handling systems: Abstract service definition conventions
� This Recommendation was not referenced from any Recommendation and some of its technical content was contained in ITU-T X.402 (1995)
|
X.408
|
Message handling systems: Encoded information type conversion rules
�
|
X.410
|
[Withdrawn] Message handling systems: remote operations and reliable transfer server
� Withdrawn on 25.11.1988
|
X.411
|
Information technology - Message Handling Systems (MHS): Message Transfer System: Abstract Service Definition and Procedures
�
|
X.412
|
Information technology - Message Handling Systems (MHS): MHS routing
�
|
X.413
|
Information technology - Message Handling Systems (MHS): Message store - Abstract service definition
�
|
X.419
|
Information technology - Message Handling Systems (MHS): Protocol Specifications
�
|
X.420
|
Information technology - Message Handling Systems (MHS): Interpersonal Messaging System
�
|
X.421
|
Message handling systems: COMFAX use of MHS
�
|
X.435
|
Information technology - Message Handling Systems (MHS): Electronic data interchange messaging system
�
|
X.440
|
Message handling systems: Voice messaging system
�
|
X.445
|
Asynchronous protocol specification - Provision of OSI connection mode network service over the telephone network
�
|
X.446
|
Common messaging call API
�
|
X.460
|
Information technology - Message Handling Systems (MHS) Management: Model and architecture
�
|
X.462
|
Information technology - Message Handling Systems (MHS) Management: Logging information
�
|
X.467
|
Information technology - Message Handling Systems (MHS) Management: Message Transfer Agent management
�
|
X.480
|
[Withdrawn] Message handling systems and directory services - conformance testing
� Withdrawn as it references documents that have been deleted by the ITU
|
X.481
|
Message handling systems - P2 protocol PICS proforma
�
|
X.482
|
Message handling systems - P1 Protocol PICS proforma
�
|
X.483
|
Message handling systems - P3 Protocol PICS proforma
�
|
X.484
|
Message handling systems - P7 protocol PICS proforma
�
|
X.485
|
Message handling systems: Voice messaging system Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.486
|
Message handling systems - Pedi protocol PICS proforma
�
|
X.487
|
Message handling systems - IPM-MS attributes PICS proforma
�
|
X.488
|
Message handling systems - EDI-MS attributes PICS proforma
�
|
X.500
|
Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services
�
|
X.Imp500
|
Directory Implementors' Guide
�
|
X.501
|
Information technology - Open Systems Interconnection - The Directory: Models
�
|
X.508
|
The Directory: Key management and public-key infrastructure establishment and maintenance
�
|
X.509
|
Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks
�
|
X.510
|
Information Technology - Open systems Interconnection - The Directory - Protocol specifications for secure operations
�
|
X.511
|
Information technology - Open Systems Interconnection - The Directory: Abstract service definition
�
|
X.518
|
Information technology - Open Systems Interconnection - The Directory: Procedures for distributed operation
�
|
X.519
|
Information technology - Open Systems Interconnection - The Directory: Protocol specifications
�
|
X.520
|
Information technology - Open Systems Interconnection - The Directory: Selected attribute types
�
|
X.521
|
Information technology - Open Systems Interconnection - The Directory: Selected object classes
�
|
X.525
|
Information technology - Open Systems Interconnection - The Directory: Replication
�
|
X.530
|
Information technology - Open Systems Interconnection - The Directory: Use of systems management for administration of the Directory
�
|
X.581
|
[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Directory Access Protocol - Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.582
|
[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Directory System Protocol - Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.583
|
[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory Access Protocol
�
|
X.584
|
[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory System Protocol
�
|
X.585
|
[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory Operational Binding Management Protocol
�
|
X.586
|
[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory Information Shadowing Protocol
�
|
X.590
|
JSON signature scheme (JSS)
�
|
X.601
|
Multi-peer communications framework
�
|
X.602
|
Information technology - Group management protocol
�
|
X.603
|
Information technology - Relayed multicast protocol: Framework
�
|
X.603.1
|
Information technology - Relayed multicast protocol: Specification for simplex group applications
�
|
X.603.2
|
Information technology - Relayed multicast protocol: Specification for N-plex group applications
�
|
X.604
|
Information technology - Mobile multicast communications: Framework
�
|
X.604.1
|
Information technology - Mobile multicast communications: Protocol over native IP multicast networks
�
|
X.604.2
|
Information technology - Mobile multicast communications: Protocol over overlay multicast networks
�
|
X.605
|
Information technology - Enhanced Communications Transport Service definition
�
|
X.606
|
Information technology - Enhanced Communications Transport Protocol: Specification of simplex multicast transport
�
|
X.606.1
|
Information technology - Enhanced Communications Transport Protocol: Specification of QoS management for simplex multicast transport
�
|
X.607
|
Information technology - Enhanced communications transport protocol: Specification of duplex multicast transport
�
|
X.607.1
|
Information technology - Enhanced communications transport protocol: Specification of QoS management for duplex multicast transport
�
|
X.608
|
Information technology - Enhanced communications transport protocol: Specification of N-plex multicast transport
�
|
X.608.1
|
Information technology - Enhanced communications transport protocol: Specification of QoS management for n-plex multicast transport
�
|
X.609
|
Managed peer-to-peer (P2P) communications: Functional architecture
�
|
X.609.1
|
Managed P2P communications: Peer activity management protocol (PAMP)
�
|
X.609.2
|
Managed P2P communications: Overlay resource control protocol (ORCP)
�
|
X.609.3
|
Managed P2P communications: Multimedia streaming signalling requirements
�
|
X.609.4
|
Managed P2P communications: Multimedia streaming peer protocol
�
|
X.609.5
|
Managed P2P communications: Overlay management protocol
�
|
X.609.6
|
Managed P2P communications: Content distribution signalling requirements
�
|
X.609.7
|
Managed P2P communications: Content distribution peer protocol
�
|
X.609.8
|
Managed P2P communications: Management protocol for live data sources
�
|
X.609.9
|
Managed P2P communications: Overlay content management protocol
�
|
X.609.10
|
Managed P2P communications: Signalling requirements for data streaming
�
|
X.610
|
Provision and support of the OSI connection-mode Network service
�
|
X.612
|
Information technology - Provision of the OSI connection-mode network service by packet-mode terminal equipment connected to an Integrated Services Digital Network (ISDN)
�
|
X.613
|
Information technology - Use of X.25 Packet Layer Protocol in conjunction with X.21/X.21 bis to provide the OSI connection-mode Network service
�
|
X.614
|
Information technology - Use of X.25 Packet Layer Protocol to provide the OSI connection-mode Network service over the telephone network
�
|
X.622
|
Information technology - Protocol for providing the connectionless-mode Network service: Provision of the underlying service by an X.25 Subnetwork
�
|
X.623
|
Information technology - Protocol for providing the connectionless-mode Network service: Provision of the underlying service by a subnetwork that provides the OSI Data Link service
�
|
X.625
|
Information technology - Protocol for providing the connectionless-mode Network service: Provision of the underlying service by ISDN circuit-switched B-channels
�
|
X.630
|
Efficient Open Systems Interconnection (OSI) operations
�
|
X.633
|
Information technology - Open Systems Interconnection - Network Fast Byte Protocol
�
|
X.634
|
Information technology - Open Systems Interconnection - Transport Fast Byte Protocol
�
|
X.637
|
Basic connection-oriented common upper layer requirements
�
|
X.638
|
Minimal OSI facilities to support basic communications applications
�
|
X.639
|
Basic connection-oriented requirements for ROSE-based profiles
�
|
X.641
|
Information technology - Quality of service: framework
�
|
X.642
|
Information technology - Quality of service - Guide to methods and mechanisms
�
|
X.650
|
Information technology - Open Systems Interconnection - Basic Reference Model: Naming and addressing
�
|
X.660
|
Information technology - Procedures for the operation of object identifier registration authorities: General procedures and top arcs of the international object identifier tree
�
|
X.662
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Registration of object identifier arcs beneath the top-level arc jointly administered by ISO and ITU-T
�
|
X.665
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Registration of application processes and application entities
�
|
X.666
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Joint ISO and ITU-T registration of international organizations
�
|
X.667
|
Information technology - Procedures for the operation of object identifier registration authorities: Generation of universally unique identifiers and their use in object identifiers
�
|
X.668
|
Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Registration of object identifier arcs for applications and services using tag-based identification
�
|
X.669
|
Procedures for ITU-T registration of identified organizations
�
|
X.670
|
Use of registration agents to register names subordinate to country names in the X.660 RH-name-tree
�
|
X.671
|
Procedures for a Registration Authority operating on behalf of countries to register organization names subordinate to country names in the X.660 RH-name-tree
�
|
X.672
|
Information technology - Open systems interconnection - Object identifier resolution system
�
|
X.674
|
Procedures for the registration of arcs under the Alerting object identifier arc
�
|
X.675
|
OID-based resolution framework for heterogeneous identifiers and locators
�
|
X.676
|
Object identifier-based resolution framework for IoT grouped services
�
|
X.677
|
Identification mechanism for unmanned aerial vehicles using object identifiers
�
|
X.680
|
Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation
�
|
X.681
|
Information technology - Abstract Syntax Notation One (ASN.1): Information object specification
�
|
X.682
|
Information technology - Abstract Syntax Notation One (ASN.1): Constraint specification
�
|
X.683
|
Information technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications
�
|
X.690
|
Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)
�
|
X.691
|
Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)
�
|
X.692
|
Information technology - ASN.1 encoding rules: Specification of Encoding Control Notation (ECN)
�
|
X.693
|
Information technology - ASN.1 encoding rules: XML Encoding Rules (XER)
�
|
X.694
|
Information technology - ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1
�
|
X.695
|
Information technology - ASN.1 encoding rules: Registration and application of PER encoding instructions
�
|
X.696
|
Information technology - ASN.1 encoding rules: Specification of Octet Encoding Rules (OER)
�
|
X.697
|
Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER)
�
|
X.700
|
Management framework for Open Systems Interconnection (OSI) for CCITT applications
�
|
X.Imp700
|
X.700-Series - OSI Systems Management Implementors' Guide
�
|
X.701
|
Information technology - Open Systems Interconnection - Systems management overview
�
|
X.702
|
Information technology - Open Systems Interconnection - Application context for systems management with transaction processing
�
|
X.703
|
Information technology - Open Distributed Management Architecture
�
|
X.710
|
Information technology - Open Systems Interconnection - Common Management Information service
�
|
X.711
|
Information technology - Open Systems Interconnection - Common Management Information Protocol: Specification
�
|
X.712
|
Information technology - Open Systems Interconnection - Common management information protocol: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.720
|
Information technology - Open Systems Interconnection - Structure of management information: Management information model
�
|
X.721
|
Information technology - Open Systems Interconnection - Structure of management information: Definition of management information
�
|
X.722
|
Information technology - Open Systems Interconnection - Structure of management information: Guidelines for the definition of managed objects
�
|
X.723
|
Information technology - Open Systems Interconnection - Structure of management information: Generic management information
�
|
X.724
|
Information technology - Open Systems Interconnection - Structure of management information: Requirements and guidelines for implementation conformance statement proformas associated with OSI management
�
|
X.725
|
Information technology - Open Systems Interconnection - Structure of management information: General Relationship Model
�
|
X.727
|
Information technology - Open Systems Interconnection - Structure of management information: Systems management application layer managed objects
�
|
X.730
|
Information technology - Open Systems Interconnection - Systems Management: Object management function
�
|
X.731
|
Information technology - Open Systems Interconnection - Systems management: State management function
�
|
X.732
|
Information technology - Open Systems Interconnection - Systems Management: Attributes for representing relationships
�
|
X.733
|
Information technology - Open Systems Interconnection - Systems Management: Alarm reporting function
�
|
X.734
|
Information technology - Open Systems Interconnection - Systems Management: Event report management function
�
|
X.735
|
Information technology - Open Systems Interconnection - Systems Management: Log control function
�
|
X.736
|
Information technology - Open Systems Interconnection - Systems Management: Security alarm reporting function
�
|
X.737
|
Information technology - Open Systems Interconnection - Systems Management: Confidence and diagnostic test categories
�
|
X.738
|
Information technology - Open Systems Interconnection - Systems management: Summarization function
�
|
X.739
|
Information technology - Open Systems Interconnection - Systems Management: Metric objects and attributes
�
|
X.740
|
Information technology - Open Systems Interconnection - Systems Management: Security audit trail function
�
|
X.741
|
Information technology - Open Systems Interconnection - Systems management: Objects and attributes for access control
�
|
X.742
|
Information technology - Open Systems Interconnection - Systems management: Usage metering function for accounting purposes
�
|
X.743
|
Information technology - Open Systems Interconnection - Systems Management: Time Management Function
�
|
X.744
|
Information technology - Open Systems Interconnection - Systems Management: Software management function
�
|
X.744.1
|
CORBA-based TMN software management service
�
|
X.745
|
Information technology - Open Systems Interconnection - Systems Management: Test management function
�
|
X.746
|
Information technology - Open Systems Interconnection - Systems Management: Scheduling function
�
|
X.748
|
Information technology - Open Systems Interconnection - Systems Management: Response Time Monitoring Function
�
|
X.749
|
Information technology - Open Systems Interconnection - Systems Management: Management domain and management policy management function
�
|
X.750
|
Information technology - Open Systems Interconnection - Systems Management: Management knowledge management function
�
|
X.751
|
Information technology - Open Systems Interconnection - Systems Management: Changeover function
�
|
X.753
|
Information technology - Open Systems Interconnection - Systems management: Command Sequencer for Systems Management
�
|
X.754
|
Enhanced Event Control Function
�
|
X.760
|
The measurement framework for the statistical indicators of website traffic
�
|
X.770
|
ODMA notification dispatch function
�
|
X.780
|
TMN guidelines for defining CORBA managed objects
�
|
X.780.1
|
TMN guidelines for defining coarse-grained CORBA managed object interfaces
�
|
X.780.2
|
TMN guidelines for defining service-oriented CORBA managed objects and fa�ade objects
�
|
X.781
|
Requirements and guidelines for Implementation Conformance Statements proformas associated with CORBA-based systems
�
|
X.782
|
Guidelines for defining web services for managed objects and management interfaces
�
|
X.783
|
Guidelines for implementation conformance statement proformas associated with web services-based management systems
�
|
X.784
|
Guidelines for implementation conformance statements proformas associated with SNMP-based management systems
�
|
X.785
|
Guidelines for defining REST-based managed objects and management interfaces
�
|
X.786
|
Guidelines for implementation conformance statement proformas associated with REST-based management systems
�
|
X.790
|
Trouble management function for ITU-T applications
�
|
X.791
|
Profile for trouble management function for ITU-T applications
�
|
X.792
|
Configuration audit support function for ITU-T applications
�
|
X.800
|
Security architecture for Open Systems Interconnection for CCITT applications
�
|
X.802
|
Information technology - Lower layers security model
�
|
X.803
|
Information technology - Open Systems Interconnection - Upper layers security model
�
|
X.805
|
Security architecture for systems providing end-to-end communications
�
|
X.810
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Overview
�
|
X.811
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Authentication framework
�
|
X.812
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework
�
|
X.813
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Non-repudiation framework
�
|
X.814
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Confidentiality framework
�
|
X.815
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Integrity framework
�
|
X.816
|
Information technology - Open Systems Interconnection - Security frameworks for open systems: Security audit and alarms framework
�
|
X.830
|
Information technology - Open Systems Interconnection - Generic upper layers security: Overview, models and notation
�
|
X.831
|
Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element (SESE) service definition
�
|
X.832
|
Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element (SESE) protocol specification
�
|
X.833
|
Information technology - Open Systems Interconnection - Generic upper layers security: Protecting transfer syntax specification
�
|
X.834
|
Information technology - Open Systems Interconnection - Generic Upper Layers Security: Security Exchange Service Element (SESE) Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.835
|
Information technology - Open Systems Interconnection - Generic Upper Layers Security: Protecting transfer syntax Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.841
|
Information technology - Security techniques - Security information objects for access control
�
|
X.842
|
Information technology - Security techniques - Guidelines for the use and management of trusted third party services
�
|
X.843
|
Information technology - Security techniques - Specification of TTP services to support the application of digital signatures
�
|
X.851
|
Information technology - Open Systems Interconnection - Service definition for the Commitment, Concurrency and Recovery service element
�
|
X.852
|
Information technology - Open Systems Interconnection - Protocol for the Commitment, Concurrency and Recovery service element: Protocol specification
�
|
X.853
|
Information technology - Open Systems Interconnection - Protocol for the Commitment, Concurrency and Recovery service element: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.860
|
Open Systems Interconnection - Distributed Transaction Processing: Model
�
|
X.861
|
Open Systems Interconnection - Distributed Transaction Processing: Service definition
�
|
X.862
|
Open Systems Interconnection - Distributed Transaction Processing: Protocol specification
�
|
X.863
|
Information technology - Open Systems Interconnection - Distributed Transaction Processing: Protocol Implementation Conformance Statement (PICS) proforma
�
|
X.880
|
Information technology - Remote Operations: Concepts, model and notation
�
|
X.881
|
Information technology - Remote Operations: OSI realizations - Remote Operations Service Element (ROSE) service definition
�
|
X.882
|
Information technology - Remote Operations: OSI realizations - Remote Operations Service Element (ROSE) protocol specification
�
|
X.891
|
Information technology - Generic applications of ASN.1: Fast infoset
�
|
X.892
|
Information technology - Generic applications of ASN.1: Fast Web Services
�
|
X.893
|
Information technology - Generic applications of ASN.1: Fast infoset security
�
|
X.894
|
Information technology - Generic applications of ASN.1: Cryptographic message syntax
�
|
X.901
|
Information technology - Open Distributed Processing - Reference Model: Overview
�
|
X.902
|
Information technology - Open Distributed Processing - Reference model: Foundations
�
|
X.903
|
Information technology - Open Distributed Processing - Reference model: Architecture
�
|
X.904
|
Information technology - Open Distributed Processing - Reference Model: Architectural Semantics
�
|
X.906
|
Information technology - Open distributed processing - Use of UML for ODP system specifications
�
|
X.910
|
Information technology - Open Distributed Processing - Naming framework
�
|
X.911
|
Information technology - Open distributed processing - Reference model - Enterprise language
�
|
X.920
|
Information technology - Open Distributed Processing - Interface Definition Language
�
|
X.930
|
Information technology - Open Distributed Processing - Interface references and binding
�
|
X.931
|
Information technology - Open Distributed Processing - Protocol support for computational interactions
�
|
X.950
|
Information technology - Open Distributed Processing - Trading Function: Specification
�
|
X.952
|
Information technology - Open Distributed Processing - Trading function: Provision of trading function using OSI Directory service
�
|
X.960
|
Information technology - Open Distributed Processing - Type repository function
�
|
X.1011
|
Guidelines for continuous protection of the service access process
�
|
X.1031
|
Roles of end users and telecommunications networks within security architecture
�
|
X.1032
|
Architecture of external interrelationships for a telecommunication IP-based network security system
�
|
X.1033
|
Guidelines on security of individual information services provided by operators
�
|
X.1034
|
Guidelines on extensible authentication protocol based authentication and key management in a data communication network
�
|
X.1035
|
Password-authenticated key exchange (PAK) protocol
�
|
X.1036
|
Framework for creation, storage, distribution and enforcement of policies for network security
�
|
X.1037
|
IPv6 technical security guidelines
�
|
X.1038
|
Security requirements and reference architecture for software-defined networking
�
|
X.1039
|
Technical security measures for implementation of ITU-T X.805 security dimensions
�
|
X.1040
|
Security reference architecture for lifecycle management of e-commerce business data
�
|
X.1041
|
Security framework for voice-over-long-term-evolution (VoLTE) network operation
�
|
X.1042
|
Security services using software-defined networking
�
|
X.1043
|
Security framework and requirements for service function chaining based on software-defined networking
�
|
X.1044
|
Security requirements of network virtualization
�
|
X.1045
|
Security service chain architecture for networks and applications
�
|
X.1046
|
Framework of software-defined security in software-defined networks/network functions virtualization networks
�
|
X.1047
|
Security requirements and architecture for network slice management and orchestration
�
|
X.1051
|
Information security, cybersecurity and privacy protection - Information security controls based on ISO/IEC 27002 for telecommunications organizations
�
|
X.1052
|
Information security management processes for telecommunication organizations
�
|
X.1053
|
Code of practice for information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations
�
|
X.1054
|
Information security, cybersecurity and privacy protection - Governance of information security
�
|
X.1055
|
Risk management and risk profile guidelines for telecommunication organizations
�
|
X.1056
|
Security incident management guidelines for telecommunications organizations
�
|
X.1057
|
Asset management guidelines in telecommunication organizations
�
|
X.1058
|
Information technology - Security techniques - Code of practice for personally identifiable information protection
�
|
X.1059
|
Implementation guidance for telecommunication organizations on risk management of their assets globally accessible in IP-based networks
�
|
X.1060
|
Framework for the creation and operation of a cyber defence centre
�
|
X.1061
|
Cyber insurance acquisition guidelines
�
|
X.1080.0
|
Access control for telebiometrics data protection
�
|
X.1080.1
|
e-Health and world-wide telemedicines - Generic telecommunication protocol
�
|
X.1080.2
|
Biology-to-machine (B2M) protocol
�
|
X.1081
|
The telebiometric multimodal model - A framework for the specification of security and safety aspects of telebiometrics
�
|
X.1082
|
Telebiometrics related to human physiology
�
|
X.1083
|
Information technology - Biometrics - BioAPI interworking protocol
�
|
X.1084
|
Telebiometrics system mechanism - Part 1: General biometric authentication protocol and system model profiles for telecommunications systems
�
|
X.1085
|
Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module
�
|
X.1086
|
Telebiometrics protection procedures - Part 1: A guideline to technical and managerial countermeasures for biometric data security
�
|
X.1087
|
Technical and operational countermeasures for telebiometric applications using mobile devices
�
|
X.1088
|
Telebiometrics digital key framework (TDK) - A framework for biometric digital key generation and protection
�
|
X.1089
|
Telebiometrics authentication infrastructure (TAI)
�
|
X.1090
|
Authentication framework with one-time telebiometric templates
�
|
X.1091
|
A guideline for evaluating telebiometric template protection techniques
�
|
X.1092
|
Integrated framework for telebiometric data protection in e-health and telemedicine
�
|
X.1093
|
Telebiometric access control with smart ID cards
�
|
X.1094
|
Telebiometric authentication using biosignals
�
|
X.1095
|
Entity authentication service for pet animals using telebiometrics
�
|
X.1101
|
Security requirements and framework for multicast communication
�
|
X.1111
|
Framework of security technologies for home network
�
|
X.1112
|
Device certificate profile for the home network
�
|
X.1113
|
Guideline on user authentication mechanisms for home network services
�
|
X.1114
|
Authorization framework for home networks
�
|
X.1121
|
Framework of security technologies for mobile end-to-end data communications
�
|
X.1122
|
Guideline for implementing secure mobile systems based on PKI
�
|
X.1123
|
Differentiated security service for secure mobile end-to-end data communication
�
|
X.1124
|
Authentication architecture for mobile end-to-end data communication
�
|
X.1125
|
Correlative Reacting System in mobile data communication
�
|
X.1126
|
Guidelines on mitigating the negative effects of infected terminals in mobile networks
�
|
X.1127
|
Functional security requirements and architecture for mobile phone anti-theft measures
�
|
X.1141
|
Security Assertion Markup Language (SAML 2.0)
�
|
X.1142
|
eXtensible Access Control Markup Language (XACML 2.0)
�
|
X.1143
|
Security architecture for message security in mobile web services
�
|
X.1144
|
eXtensible Access Control Markup Language (XACML) 3.1
�
|
X.1145
|
Security framework and requirements for open capabilities of telecommunication services
�
|
X.1146
|
Secure protection guidelines for value-added services provided by telecommunication operators
�
|
X.1147
|
Security requirements and framework for big data analytics in mobile Internet services
�
|
X.1148
|
Framework of de-identification process for telecommunication service providers
�
|
X.1149
|
Security framework of an open platform for FinTech services
�
|
X.1150
|
Security assurance framework for digital financial services
�
|
X.1151
|
Guideline on secure password-based authentication protocol with key exchange
�
|
X.1152
|
Secure end-to-end data communication techniques using trusted third party services
�
|
X.1153
|
Management framework of a one time password-based authentication service
�
|
X.1154
|
General framework of combined authentication on multiple identity service provider environments
�
|
X.1155
|
Guidelines on local linkable anonymous authentication for electronic services
�
|
X.1156
|
Non-repudiation framework based on a one-time password
�
|
X.1157
|
Technical capabilities of fraud detection and response for services with high assurance level requirements
�
|
X.1158
|
Multi-factor authentication mechanisms using a mobile device
�
|
X.1159
|
Delegated non-repudiation architecture based on ITU-T X.813
�
|
X.1161
|
Framework for secure peer-to-peer communications
�
|
X.1162
|
Security architecture and operations for peer-to-peer networks
�
|
X.1163
|
Security requirements and mechanisms of peer-to-peer-based telecommunication networks
�
|
X.1164
|
Use of service providers' user authentication infrastructure to implement public key infrastructure for peer-to-peer networks
�
|
X.1171
|
Threats and requirements for protection of personally identifiable information in applications using tag-based identification
�
|
X.1191
|
Functional requirements and architecture for IPTV security aspects
�
|
X.1192
|
Functional requirements and mechanisms for the secure transcodable scheme of IPTV
�
|
X.1193
|
Key management framework for secure internet protocol television (IPTV) services
�
|
X.1194
|
Algorithm selection scheme for service and content protection descrambling
�
|
X.1195
|
Service and content protection interoperability scheme
�
|
X.1196
|
Framework for the downloadable service and content protection system in the mobile Internet Protocol television environment
�
|
X.1197
|
Guidelines on criteria for selecting cryptographic algorithms for IPTV service and content protection
�
|
X.1198
|
Virtual machine-based security platform for renewable IPTV service and content protection
�
|
X.1205
|
Overview of cybersecurity
�
|
X.1206
|
A vendor-neutral framework for automatic notification of security related information and dissemination of updates
�
|
X.1207
|
Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted software
�
|
X.1208
|
A cybersecurity indicator of risk to enhance confidence and security in the use of telecommunication/information and communication technologies
�
|
X.1209
|
Capabilities and their context scenarios for cybersecurity information sharing and exchange
�
|
X.1210
|
Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks
�
|
X.1211
|
Techniques for preventing web-based attacks
�
|
X.1212
|
Design considerations for improved end-user perception of trustworthiness indicators
�
|
X.1213
|
Security capability requirements for countering smartphone-based botnets
�
|
X.1214
|
Security assessment techniques in telecommunication/information and communication technology networks
�
|
X.1215
|
Use cases for structured threat information expression
�
|
X.1216
|
Requirements for collection and preservation of cybersecurity incident evidence
�
|
X.1217
|
Guidelines for applying threat intelligence in telecommunication network operation
�
|
X.1218
|
Requirements and guidelines for dynamic malware analysis in a sandbox environment
�
|
X.1219
|
Functional requirements for a secured process to evaluate technical vulnerabilities
�
|
X.1220
|
Security framework for storage protection against malware attacks on hosts
�
|
X.1231
|
Technical strategies for countering spam
�
|
X.1232
|
Technical framework for countering advertising spam in user-generated information
�
|
X.1233
|
Guidelines for countering spam over instant messaging
�
|
X.1234
|
Guidelines for countering multimedia messaging service spam
�
|
X.1235
|
Technologies in countering website spoofing for telecommunication organizations
�
|
X.1236
|
Security requirements and countermeasures for targeted email attacks
�
|
X.1237
|
Technical security framework for personally identifiable information protection while countering mobile messaging spam
�
|
X.1240
|
Technologies involved in countering e-mail spam
�
|
X.1241
|
Technical framework for countering email spam
�
|
X.1242
|
Short message service (SMS) spam filtering system based on user-specified rules
�
|
X.1243
|
Interactive gateway system for countering spam
�
|
X.1244
|
Overall aspects of countering spam in IP-based multimedia applications
�
|
X.1245
|
Framework for countering spam in IP-based multimedia applications
�
|
X.1246
|
Technologies involved in countering voice spam in telecommunication organizations
�
|
X.1247
|
Technical framework for countering mobile messaging spam
�
|
X.1248
|
Technical requirements for countering instant messaging spam
�
|
X.1249
|
Technical framework for countering mobile in-application advertising spam
�
|
X.1250
|
Baseline capabilities for enhanced global identity management and interoperability
�
|
X.1251
|
A framework for user control of digital identity
�
|
X.1252
|
Baseline identity management terms and definitions
�
|
X.1253
|
Security guidelines for identity management systems
�
|
X.1254
|
Entity authentication assurance framework
�
|
X.1255
|
Framework for discovery of identity management information
�
|
X.1256
|
Guidelines and framework for sharing network authentication results with service applications
�
|
X.1257
|
Identity and access management taxonomy
�
|
X.1258
|
Enhanced entity authentication based on aggregated attributes
�
|
X.1261
|
Policy framework including principles for digital identity infrastructure
�
|
X.1275
|
Guidelines on protection of personally identifiable information in the application of RFID technology
�
|
X.1276
|
Authentication step-up protocol and metadata Version 1.0
�
|
X.1277
|
Universal authentication framework
�
|
X.1277.2
|
Universal authentication framework protocol specification
�
|
X.1278
|
Client to authenticator protocol/Universal 2-factor framework
�
|
X.1278.2
|
Client to authenticator protocol
�
|
X.1279
|
Framework of enhanced authentication using telebiometrics with anti-spoofing detection mechanisms
�
|
X.1280
|
Framework for out-of-band server authentication using mobile devices
�
|
X.1281
|
APIs for interoperability of identity management systems
�
|
X.1282
|
Security measures for countering password-related online attacks
�
|
X.1283
|
Threat Analysis and guidelines for securing password and password-less authentication solutions
�
|
X.1303
|
Common alerting protocol (CAP 1.1)
�
|
X.1303bis
|
Common alerting protocol (CAP 1.2)
�
|
X.1311
|
Information technology - Security framework for ubiquitous sensor networks
�
|
X.1312
|
Ubiquitous sensor network middleware security guidelines
�
|
X.1313
|
Security requirements for wireless sensor network routing
�
|
X.1314
|
Security requirements and framework of ubiquitous networking
�
|
X.1331
|
Security guidelines for home area network (HAN) devices in smart grid systems
�
|
X.1332
|
Security guidelines for smart metering services in smart grids
�
|
X.1333
|
Security guidelines for use of remote access tools in Internet-connected control systems
�
|
X.1341
|
Certified mail transport and certified post office protocols
�
|
X.1352
|
Security requirements for Internet of things devices and gateways
�
|
X.1353
|
Blockchain-based Security Methodology for Zero-Touch Deployment of Massive IoT
�
|
X.1354
|
Security controls for IoT systems
�
|
X.1361
|
Security framework for the Internet of things based on the gateway model
�
|
X.1362
|
Simple encryption procedure for Internet of things (IoT) environments
�
|
X.1363
|
Technical framework of personally identifiable information handling system in Internet of things environment
�
|
X.1364
|
Security requirements and framework for narrowband Internet of things
�
|
X.1365
|
Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks
�
|
X.1366
|
Aggregate message authentication schemes for Internet of things environment
�
|
X.1367
|
Standard format for Internet of things error logs for security incident operations
�
|
X.1368
|
Secure firmware or software update for Internet of things devices
�
|
X.1369
|
Security requirements for IoT service platform
�
|
X.1371
|
Security threats to connected vehicles
�
|
X.1372
|
Security guidelines for vehicle-to-everything (V2X) communication
�
|
X.1373
|
Secure software update capability for intelligent transportation system communication devices
�
|
X.1374
|
Security requirements for external interfaces and devices with vehicle access capability
�
|
X.1375
|
Guidelines for an intrusion detection system for in-vehicle networks
�
|
X.1376
|
Security-related misbehaviour detection mechanism using big data for connected vehicles
�
|
X.1377
|
Guidelines for an intrusion prevention system for connected vehicles
�
|
X.1379
|
Security requirements for roadside units in intelligent transportation systems
�
|
X.1380
|
Security guidelines for cloud-based event data recorders in automotive environments
�
|
X.1381
|
Security guidelines for Ethernet-based in-vehicle networks
�
|
X.1382
|
Guidelines for sharing security threat information on connected vehicles
�
|
X.1383
|
Security requirements for categorized data in vehicle-to-everything (V2X) communication
�
|
X.1384
|
Security requirements and guidelines for vehicular edge computing
�
|
X.1400
|
Terms and definitions for distributed ledger technology
�
|
X.1401
|
Security threats of distributed ledger technology
�
|
X.1402
|
Security framework for distributed ledger technology
�
|
X.1403
|
Security guidelines for using distributed ledger technology for decentralized identity management
�
|
X.1404
|
Security assurance for distributed ledger technology
�
|
X.1405
|
Security threats and requirements for digital payment services based on distributed ledger technology
�
|
X.1406
|
Security threats to online voting systems using distributed ledger technology
�
|
X.1407
|
Security requirements for digital integrity proofing service based on distributed ledger technology
�
|
X.1408
|
Security threats and requirements for data access and sharing based on the distributed ledger technology
�
|
X.1409
|
Security services based on distributed ledger technology
�
|
X.1410
|
Security architecture of data sharing management based on the distributed ledger technology
�
|
X.1411
|
Guideline on blockchain as a service (BaaS) security
�
|
X.1412
|
Security requirements for smart contract management based on the distributed ledger technology
�
|
X.1450
|
Guidelines on hybrid authentication and key management mechanisms in the client-server model
�
|
X.1451
|
Risk identification to optimize authentication
�
|
X.1452
|
Guidelines for security services provided by operators
�
|
X.1453
|
Security threats and requirements for video management systems
�
|
X.1454
|
Security measures for location-enabled smart office services
�
|
X.1455
|
Security measures for a smart residential community
�
|
X.1470
|
Security guidelines of web-based online customer service
�
|
X.1471
|
Reference monitor for online analytics services
�
|
X.1500
|
Overview of cybersecurity information exchange
�
|
X.1500.1
|
Procedures for the registration of arcs under the object identifier arc for cybersecurity information exchange
�
|
X.1520
|
Common vulnerabilities and exposures
�
|
X.1521
|
Common vulnerability scoring system
�
|
X.1524
|
Common weakness enumeration
�
|
X.1525
|
Common weakness scoring system
�
|
X.1526
|
Language for the open definition of vulnerabilities and for the assessment of a system state
�
|
X.1528
|
Common platform enumeration
�
|
X.1528.1
|
Common platform enumeration naming
�
|
X.1528.2
|
Common platform enumeration name matching
�
|
X.1528.3
|
Common platform enumeration dictionary
�
|
X.1528.4
|
Common platform enumeration applicability language
�
|
X.1541
|
Incident object description exchange format version 2
�
|
X.1542
|
Session information message exchange format
�
|
X.1544
|
Common attack pattern enumeration and classification
�
|
X.1546
|
Malware attribute enumeration and characterization
�
|
X.1550
|
Access control models for incident exchange networks
�
|
X.1570
|
Discovery mechanisms in the exchange of cybersecurity information
�
|
X.1580
|
Real-time inter-network defence
�
|
X.1581
|
Transport of real-time inter-network defence messages
�
|
X.1582
|
Transport protocols supporting cybersecurity information exchange
�
|
X.1600
|
Security architecture of edge cloud
�
|
X.1601
|
Security framework for cloud computing
�
|
X.1602
|
Security requirements for software as a service application environments
�
|
X.1603
|
Data security requirements for the monitoring service of cloud computing
�
|
X.1604
|
Security requirements of Network as a Service (NaaS) in cloud computing
�
|
X.1605
|
Security requirements of public Infrastructure as a Service (IaaS) in cloud computing
�
|
X.1606
|
Security requirements for communications as a service application environments
�
|
X.1631
|
Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services
�
|
X.1641
|
Guidelines for cloud service customer data security
�
|
X.1642
|
Guidelines for the operational security of cloud computing
�
|
X.1643
|
Security requirements and guidelines for virtualization containers in cloud computing environments
�
|
X.1644
|
Security guidelines for distributed cloud
�
|
X.1645
|
Requirements of network security situational awareness platform for cloud computing
�
|
X.1647
|
Security guidelines for selecting computing methods and resources from Cloud Service Providers
�
|
X.1702
|
Quantum noise random number generator architecture
�
|
X.1710
|
Security framework for quantum key distribution networks
�
|
X.1712
|
Security requirements and measures for quantum key distribution networks - key management
�
|
X.1713
|
Security requirements for the protection of quantum key distribution nodes
�
|
X.1714
|
Key combination and confidential key supply for quantum key distribution networks
�
|
X.1715
|
Security requirements and measures for integration of quantum key distribution network and secure storage network
�
|
X.1716
|
Authentication and authorization in quantum key distribution network (QKDN)
�
|
X.1717
|
Security requirements and measures for quantum key distribution network (QKDN) - control and management
�
|
X.1750
|
Guidelines on security of big data as a service for big data service providers
�
|
X.1751
|
Security guidelines for big data lifecycle management by telecommunication operators
�
|
X.1752
|
Security guidelines for big data infrastructure and platform
�
|
X.1770
|
Technical guidelines for secure multi-party computation
�
|
X.1771
|
Security guidelines for combining de-identified data using trusted third party
�
|
X.1811
|
Security guidelines for applying quantum-safe algorithms in IMT-2020 systems
�
|
X.1812
|
Security framework based on trust relationships for the IMT-2020 ecosystem
�
|
X.1813
|
Security and monitoring requirements for operation of vertical services supporting ultra-reliability and low latency communication (URLLC) in IMT-2020 private networks
�
|
X.1814
|
Security guidelines for IMT-2020 communication system
s
�
|
X.1815
|
Security guidelines and requirements for IMT-2020 edge computing services
�
|
X.1816
|
Guidelines and requirements for classifying security capabilities in IMT-2020 network slice
�
|
X.1817
|
Security requirements for 5G messaging service
�
|
X.1818
|
Security controls for operation and maintenance of IMT-2020/5G network systems
�
|
X.1819
|
Security capabilities of network layer for IMT-2020/5G edge computing
�
|
X.1820
|
Security Requirements for Operation of IMT-2020/5G Core Network to Support Vertical Services
�
|
X.2011
|
Security guidelines for digital twin network
�
|
X.2012
|
Security measures for digital twin system of smart cities
�
|
X.ImpOSI
|
OSI Implementers' Guide - Version 1.1
�
|
X.Sup1
|
ITU-T X.135 - Supplement related to some test results from specific national and international portions
�
|
X.Sup2
|
ITU-T X.800-X.849 series - Supplement on security baseline for network operators
�
|
X.Sup3
|
ITU-T X.800-X.849 series - Supplement on guidelines for implementing system and network security
�
|
X.Sup4
|
ITU-T X.290-series - Supplement on generic approach to interoperability testing
�
|
X.Sup5
|
ITU-T X.290 series - Supplement on interoperability testing framework and methodology
�
|
X.Sup6
|
ITU-T X.1240 series - Supplement on countering spam and associated threats
�
|
X.Sup7
|
ITU-T X.1250 series - Supplement on overview of identity management in the context of cybersecurity
�
|
X.Sup8
|
ITU-T X.1205 - Supplement on best practices against botnet threats
�
|
X.Sup9
|
ITU-T X.1205 - Supplement on guidelines for reducing malware in ICT networks
�
|
X.Sup10
|
ITU-T X.1205 - Supplement on usability of network traceback
�
|
X.Sup11
|
ITU-T X.1245 - Supplement on framework based on real-time blocking lists for countering VoIP spam
�
|
X.Sup12
|
ITU-T X.1240 - Supplement on overall aspects of countering mobile messaging spam
�
|
X.Sup13
|
ITU-T X.1051 - Supplement on information security management users' guide for Recommendation ITU-T X.1051
�
|
X.Sup14
|
ITU-T X.1243 - Supplement on a practical reference model for countering e-mail spam using botnet information
�
|
X.Sup15
|
ITU-T X.800-X.849 series - Supplement on guidance for creating a national IP-based public network security centre for developing countries
�
|
X.Sup16
|
ITU-T X.800-X.849 series - Supplement on architectural systems for security controls for preventing fraudulent activities in public carrier networks
�
|
X.Sup17
|
ITU-T X.1143 - Supplement on threats and security objectives for enhanced web-based telecommunication services
�
|
X.Sup18
|
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based telecommunication networks
�
|
X.Sup19
|
ITU-T X.1120-X.1139 series - Supplement on security aspects of smartphones
�
|
X.Sup20
|
ITU-T X.1205 - Supplement on framework of security information sharing negotiation
�
|
X.Sup21
|
ITU-T X.1143 - Supplement on security framework for web mashup services
�
|
X.Sup22
|
ITU-T X.1144 - Supplement on enhancements and new features in eXtensible Access Control Markup Language (XACML 3.0)
�
|
X.Sup23
|
ITU-T X.1037 - Supplement on security management guidelines for the implementation of an IPv6 environment in telecommunication organizations
�
|
X.Sup24
|
ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices
�
|
X.Sup25
|
ITU-T X.1231 - Supplement on guidance to assist in countering spam for mobile phone developers
�
|
X.Sup26
|
ITU-T X.1111 - Supplement on security functional architecture for smart grid services using telecommunication networks
�
|
X.Sup27
|
ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso
�
|
X.Sup28
|
ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup29
|
ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup30
|
ITU-T X.805 - Supplement on security guidelines for mobile virtual network operators
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup31
|
ITU-T X.660 - Supplement on guidelines for using object identifiers for the Internet of things
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup32
|
ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup33
|
ITU-T X.1231 - Supplement on technical framework for countering telephone service scams
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup34
|
ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations
� This Supplement was replaced on 03/05/2019 to reflect and updated title
|
X.Sup35
|
ITU-T X.1254 - Supplement on use cases of entity authentication assurance (EAA) framework
�
|
X.Sup36
|
ITU-T X.1051 - Supplement on critical security controls for information and network security management by telecommunication organizations
�
|
X.Sup37
|
ITU-T X.1231 - Supplement on countering spam based on machine learning
�
|
X.Sup38
|
ITU-T X.1152 - Supplement on use cases for contact tracing technologies to prevent spread of infectious diseases
�
|
X.Sup39
|
ITU-T X.1148 - Supplement on requirements for data de-identification assurance
�
|
X.Sup40
|
ITU-T X.1152 - Supplement on use cases for digital COVID-19 certificates
�
|
X.Sup41
|
Supplement to ITU-T X.1254: e-KYC use cases in digital financial services
�
|
X.Sup42
|
Supplement to ITU-T X.1254: Implementation of secure authentication technologies for digital financial services
�
|
X.Sup43
|
Supplement to X.1813 - Security deployment scenarios for cellular vehicle -to-everything (C-V2X) services supporting ultra-reliable and low latency communication (URLLC)
�
|