Framework of security technologies for mobile end-to-end data communications |
|
This Recommendation describes the security threats to mobile end-to-end data communications and the security requirements from the point of view of the mobile users and application service providers (ASP). In addition, this Recommendation shows where the security technologies which realize certain security function appear in the models of mobile end-to-end data communications. |
|
Citation: |
https://handle.itu.int/11.1002/1000/7288 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1120-X.1139: Mobile security |
Approval date: |
2004-04-29 |
Provisional name: | X.msec-1 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1121 (04/2004)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 19 (04/2013)
|
ITU-T X.1120-X.1139 series – Supplement on security aspects of smartphones
|
In force
|
here
|
here
|
here
|
X Suppl. 24 (09/2014)
|
ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security in telecommunications and information technology (7th edition)
|
2020
|
here
|
Security in Telecommunications and Information Technology
|
2015
|
here
|
Security in Telecommunications and Information Technology
|
2011
|
here
|
Security in Telecommunications and Information Technology
|
2009
|
here
|
Security in Telecommunications and Information Technology
|
2004
|
here
|
Security in Telecommunications and Information Technology
|
2003
|
here
|
|