Differentiated security service for secure mobile end-to-end data communication |
|
Recommendation ITU-T X.1123 describes the differentiated security service for secure mobile communication. The investigation of differentiated security service is important for both service providers and users. The service providers can use the differentiated security service to overcome the rigorous circumstances of wireless access networks and satisfy various users and services with different levels of security. The differentiated security service is realized by security policy with three layers. One layer is super security policy used as a value-added service that safeguards mobile communication with sensitive information. The second layer is baseline security policy used as the prevalent service that satisfies mobile communication without sensitive information. The last layer is no security policy, defined as the policy under which no security function is configured during communication. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9264 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1120-X.1139: Mobile security |
Approval date: |
2007-11-13 |
Provisional name: | X.msec-3 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1123 (11/2007)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 19 (04/2013)
|
ITU-T X.1120-X.1139 series – Supplement on security aspects of smartphones
|
In force
|
here
|
here
|
here
|
X Suppl. 24 (09/2014)
|
ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|