Marco de aplicaciones multimedios IP para la lucha contra el correo basura |
|
La Recomendación UIT-T X.1245 contiene el marco general para combatir el correo basura en las aplicaciones multimedios IP tales como la telefonía IP, la mensajería instantánea, las conferencias multimedios, etc. Dicho marco consta de cuatro funciones de lucha contra el correo basura, a saber, funciones medulares de lucha contra el correo basura (core anti-spam functions, CASF), funciones de lucha contra el correo basura en el lado receptor (recipient-side anti-spam functions, RASF), funciones de lucha contra el correo basura en el lado emisor (sender-side anti-spam functions, SASF), y funciones receptoras de correo basura (spam recipient functions, SRF). En esta Recomendación se describen las funcionalidades y las interfaces de cada función para combatir el correo basura en multimedios IP. |
|
Citation: |
https://handle.itu.int/11.1002/1000/10830 |
Series title: |
X series: Data networks, open system communications and security X.1200-X.1299: Cyberspace security X.1230-X.1249: Countering spam |
Approval date: |
2010-12-17 |
Provisional name: | X.fcsip |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1245 (12/2010)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 6 (09/2009)
|
ITU-T X.1240 series – Supplement on countering spam and associated threats
|
In force
|
here
|
here
|
here
|
X Suppl. 11 (09/2011)
|
ITU-T X.1245 - Supplement on framework based on real-time blocking lists for countering VoIP spam
|
In force
|
here
|
here
|
here
|
X Suppl. 28 (09/2016)
|
ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Unified Security Model (USM) – A neutral integrated system approach to cybersecurity
|
2020
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|