ITU

Committed to connecting the world

List of Editors

ITEMTITLEEDITOR
X.TRSM6edTechnical Report Security in telecommunications and information technology - An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications; 6th editionMike Harrop
(Editor)

E-mail: mharrop@bcs.org
X.gsiisoGuidelines on security of the individual information service for operatorsJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Bo Yu
(Editor)

E-mail: yubo49@chinaunicom.cn
X.sgmvnoSupplement to ITU-T X.805 Security guideline for mobile virtual network operator (MVNO)Hongwei Luo
(Editor)

E-mail: luohongwei@chinattl.com


Laifu Wang
(Editor)

E-mail: wanglf@gsta.com
X.tigscTechnical implementation guidelines for ITU-T X.805Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr
X.1051revInformation technology - Security techniques - Information security control guidelines based on ISO/IEC 27002 for telecommunications organizationsWataru Senga
(Editor)

E-mail: wa-senga@kddi.com


Kyeong Hee Oh
(Editor)

E-mail: khoh@tcaservices.kr
X.gpimInformation technology - Security techniques - Code of practice for personally identifiable information protectionHeung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr


Soonjoung Byun
(Editor)

E-mail: sjbyun@kisa.or.kr


Lijun Liu
(Editor)

E-mail: liulijun@chinamobile.com
X.sgsmInformation security management guidelines for small and medium telecommunication organizationsWataru Senga
(Editor)

E-mail: wa-senga@kddi.com
X.sup-gpimSupplement to ITU-T X.gpim Code of practice for personally identifiable information protection for telecommunications organizationsLijun Liu
(Editor)

E-mail: liulijun@chinamobile.com


Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr
X.1500 Amd.7Overview of cybersecurity information exchange - Amendment 7 - Revised structured cybersecurity information exchange techniquesYouki Kadobayashi
(Editor)

E-mail: youki-k@is.aist-nara.ac.jp
X.1525Common weakness scoring systemRobert A. Martin
(Editor)

E-mail: ramartin@mitre.org
X.ceeCommon event expressionRobert A. Martin
(Editor)

E-mail: ramartin@mitre.org
X.cee.1CEE overviewRobert A. Martin
(Editor)

E-mail: ramartin@mitre.org
X.cee.2CEE profileRobert A. Martin
(Editor)

E-mail: ramartin@mitre.org
X.cee.3CEE common log syntax (CLS)Robert A. Martin
(Editor)

E-mail: ramartin@mitre.org
X.cee.4CEE common log transport (CLT) requirementsRobert A. Martin
(Editor)

E-mail: ramartin@mitre.org
X.cogentDesign considerations for improved end-user perception of trustworthiness indicatorsYouki Kadobayashi
(Editor)

E-mail: youki-k@is.aist-nara.ac.jp


Daisuke Miyamoto
(Editor)

E-mail: daisu-mi@nc.u-tokyo.ac.jp
X.csmcAn iterative model for cybersecurity operation using CYBEX techniquesInette Furey
(Editor)

E-mail: Inette.Furey@dhs.gov


Youki Kadobayashi
(Editor)

E-mail: youki-k@is.aist-nara.ac.jp


Robert A. Martin
(Editor)

E-mail: ramartin@mitre.org


Kathleen Moriarty
(Editor)

E-mail: Kathleen.Moriarty@emc.com


Takeshi Takahashi
(Editor)

E-mail: takeshi_takahashi@nict.go.jp
X.sbbSecurity capability requirements for countering smartphone-based botnetsJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Bo Yu
(Editor)

E-mail: yubo49@chinaunicom.cn


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr
X.simefSession information message exchange format (SIMEF)Ik-Kyun Kim
(Editor)

E-mail: jhk@etri.re.kr


Jong-Hyun Kim
(Editor)

E-mail: jhk@etri.re.kr
X.cspimTechnical requirements for countering instant messaging spam (SPIM)Huamin Jin
(Editor)

E-mail: jhm@gsta.com;


Zhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Miyeon Yoon
(Editor)

E-mail: myyoon@kisa.or.kr
X.gcspiSupplement to ITU-T X.1242, Guideline for countermeasures against short message service (SMS) phishing incidentsLijun Liu
(Editor)

E-mail: liulijun@chinamobile.com


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Deawoo Park
(Editor)

E-mail: porf_pdw@naver.com
X.tfcmmTechnical framework for countering mobile messaging spamZhu Annan
(Editor)

E-mail: zhuan3@chinaunicom.cn


Gao Feng
(Editor)

E-mail: gaofeng149@chinaunicom.cn


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.ticscSupplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the visited network of VoLTEBo Yu
(Editor)

E-mail: yubo49@chinaunicom.cn


Cie Yuan
(Editor)

E-mail: yuanjie@chinamobile.com
X.ticvsTechnologies involved in countering voice spam in telecommunication organizationsXuetao Du
(Editor)

E-mail: duxuetao@cmdi.chinamobile.com


Tao Lou
(Editor)

X.1255supSupplement to Recommendation ITU-T X.1255, Proposed conceptual models based on ITU-T X.1255 frameworksAbbie Barbir
(Editor)

E-mail: abbie.barbir@bankofamerica.com
X.authiGuidelines and framework for sharing network authentication results with service applicationsMin Zuo
(Editor)

E-mail: zuomin@chinamobile.com


Lijun Liu
(Editor)

E-mail: liulijun@chinamobile.com
X.eaaaEnhanced entity authentication based on aggregated attributesTae-Kyung Kim
(Editor)

E-mail: tkkim@stu.ac.kr


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.iamtIdentity and access management taxonomyRadu Marian
(Editor)

E-mail: radu.marian@baml.com
X.idmccRequirements of IdM in cloud computingGao Feng
(Editor)

E-mail: gaofeng149@chinaunicom.cn


Jing Wu
(Editor)

E-mail: wujing@mail.ritt.com.cn


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.scim-useApplication of system for cross identity management (SCIM) in telecommunication environmentsRadu Marian
(Editor)

E-mail: radu.marian@baml.com
X.cc-controlInformation technology - Security techniques - Code of practice for information security controls for cloud computing services based on ISO/IEC 27002Koji Nakao
(Editor)

E-mail: ko-nakao@kddi.com


Huirong Tian
(Editor)

E-mail: tianhuirong@mail.ritt.com.cn
X.CSCDataSecGuidelines for cloud service customer data securityNan Meng
(Editor)

E-mail: mengnan@catr.cn
X.gosccGuidelines of operational security for cloud computingMing He
(Editor)

E-mail: hem@gsta.com


Zhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Jun Shen
(Editor)

E-mail: shenjun@gsta.com


Huirong Tian
(Editor)

E-mail: tianhuirong@mail.ritt.com.cn


Laifu Wang
(Editor)

E-mail: wanglf@gsta.com
X.sfcseSecurity requirements for Software as a Service (SaaS) application environmentsPeng Zhao
(Editor)

E-mail: zhaopeng@ctbri.com.cn


Ruoni Wang
(Editor)

E-mail: wangrn@ctbri.com.cn
X.iotsec-1Simple encryption procedure for IoT device securityHirotaka Yoshida
(Editor)

E-mail: hirotaka.yoshida.qv@hitachi.com
X.itssec-1Software update capability for ITS communications devicesMasashi Eto
(Editor)

E-mail: eto@nict.go.jp


Koji Nakao
(Editor)

E-mail: ko-nakao@kddi.com
X.itssec-2Security guidelines for V2X communication systemsSang-Woo Lee
(Editor)

E-mail: ttomlee@etri.re.kr


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr
X.msec-7Guidelines on the management of infected terminals in mobile networksXuetao Du
(Editor)

E-mail: duxuetao@cmdi.chinamobile.com


Lou Tao
(Editor)

E-mail: loutao@chinamobile.com


Chen Zhang
(Editor)

E-mail: zhangchen@cmdi.chinamobile.com
X.msec-9Functional security requirements and architecture for mobile phone anti-theft measuresJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr
X.sdnsec-1Requirements for security services based on software-defined networkingHyoungshick Kim
(Editor)

E-mail: hyoung@skku.edu


Jung Soo Park
(Editor)

E-mail: pjs@etri.re.kr
X.sgsec-1Security functional architecture for smart grid services using telecommunication networkTadashi Kaji
(Editor)

E-mail: tadashi.kaji.ck@hitachi.com


Mi Joo Kim
(Editor)

E-mail: mijoo.kim@kisa.or.kr


Miyeon Yoon
(Editor)

E-mail: myyoon@kisa.or.kr
X.sgsec-2Security guidelines for home area network (HAN) devices in smart grid systemsHaeryong Park
(Editor)

E-mail: hrpark@kisa.or.kr


Woong Go
(Editor)

E-mail: wgo@kisa.or.kr


Jeong-Jun Suh
(Editor)

E-mail: jjun2@kisa.or.kr
X.1141 Amd.1Security Assertion Markup Language (SAML 2.0) - Amendment 1: ErrataAbbie Barbir
(Editor)

E-mail: abbie.barbir@bankofamerica.com
X.1142 Amd.1eXtensible Access Control Markup Language (XACML 2.0) - Amendment 1: ErrataAbbie Barbir
(Editor)

E-mail: abbie.barbir@bankofamerica.com
X.1157Technical capabilities of fraud detection and response for services with high assurance level requirementsHyung-jin Lim
(Editor)

E-mail: hjlim@fsa.or.kr


Tae-Kyung Kim
(Editor)

E-mail: tkkim@stu.ac.kr
X.p2p-3Security requirements and mechanisms of peer-to-peer-based telecommunication networkLijun Liu
(Editor)

E-mail: liulijun@chinamobile.com


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr
X.sap-5Guideline on local linkable anonymous authentication for electronic servicesSokjoon Lee
(Editor)

E-mail: junny@etri.re.kr
X.websec-6Security framework and requirements for open capabilities of telecommunication servicesGao Feng
(Editor)

E-mail: gaofeng149@chinaunicom.cn


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.websec-7Reference monitor for online analytics servicesHyung-jin Lim
(Editor)

E-mail: hjlim@fsa.or.kr


Jongyoul Park
(Editor)

E-mail: jongyoul@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.bhsmInformation technology - Security Techniques - Telebiometric authentication framework using biometric hardware security moduleYong Nyuo Shin
(Editor)

E-mail: ynshin@hycu.ac.kr


Myung Geun Chun
(Editor)

E-mail: mgchun@chungbuk.ac.kr
X.tamA guideline to technical and operational countermeasures for telebiometric applications using mobile devicesJason Kim
(Editor)

E-mail: jskim@kisa.or.kr


Yong Nyuo Shin
(Editor)

E-mail: ynshin@hycu.ac.kr
X.th2Telebiometrics related to physicsMichele Peiry
(Editor)

E-mail: michele.peiry@hotmail.com
X.th3Telebiometrics related to chemistryMichele Peiry
(Editor)

E-mail: michele.peiry@hotmail.com
X.th4Telebiometrics related to biologyPaul Gerome
(Editor)

E-mail: drdrpaul@gmail.com
X.th5Telebiometrics related to culturologyPaul Gerome
(Editor)

E-mail: drdrpaul@gmail.com
X.th6Telebiometrics related to psychologyPaul Gerome
(Editor)

E-mail: drdrpaul@gmail.com
X.th13Holosphere to biosphere secure data acquisition and telecommunication protocolOlivier Vuillemin
(Editor)

E-mail: olivier@vuillemin.ch
e-X.Imp500Directory Implemeneter's GuideErik Andersen
(Editor)

E-mail: era@x500.eu
X.500 (eighth edition)Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and servicesErik Andersen
(Editor)

E-mail: era@x500.eu
X.501 (eighth edition)Information technology - Open Systems Interconnection - The Directory - ModelsErik Andersen
(Editor)

E-mail: era@x500.eu
X.509 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Public-key and attribute certificate frameworksErik Andersen
(Editor)

E-mail: era@x500.eu
X.509 Cor.1Information technology - Open Systems Interconnection - The Directory - Public-key and attribute certificate frameworks - Technical Corrigendum 1Erik Andersen
(Editor)

E-mail: era@x500.eu
X.511 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Abstract Service DefinitionErik Andersen
(Editor)

E-mail: era@x500.eu
X.518 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Procedures for Distributed OperationsErik Andersen
(Editor)

E-mail: era@x500.eu
X.519 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Protocols specificationsErik Andersen
(Editor)

E-mail: era@x500.eu
X.520 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Selected Attribute TypesErik Andersen
(Editor)

E-mail: era@x500.eu
X.521 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Selected object classesErik Andersen
(Editor)

E-mail: era@x500.eu
X.525 (eighth edition)Information technology - Open Systems Interconnection - The Directory - ReplicationErik Andersen
(Editor)

E-mail: era@x500.eu
X.1341Certified mail transport and certified post office protocolsDavid Keller
(Editor)

E-mail: david.keller@legalbox.com


Laura Prin
(Editor)

E-mail: laura.prin@legalbox.com
X.cmsInformation technology - Generic applications of ASN.1: Cryptographic Message Syntax (CMS)Jean-Paul Lemaire
(Editor)

E-mail: jean-paul.lemaire@univ-paris-diderot.fr
X.oiddevInformation technology - Use of object identifiers to identify devices in the Internet of ThingsJun Seob Lee
(Editor)

E-mail: juns@etri.re.kr
X.oid-iotSupplement to ITU-T X-series - ITU-T X.660 - Guidelines for using object identifiers for the Internet of ThingsZhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Dongya Wu
(Editor)

E-mail: wudy@cesi.cn
X.orfOID-based resolution framework for heterogeneous identifiers/locatorsYounghwan Choi
(Editor)

E-mail: yhc@etri.re.kr
X.pki-emInformation Technology - Public-Key Infrastructure: Establishment and maintenanceErik Andersen
(Editor)

E-mail: era@x500.eu
X.pki-profInformation Technology - Public-Key Infrastructure: ProfileErik Andersen
(Editor)

E-mail: era@x500.eu
Z.100 Annex F1Specification and Description Language - Overview of SDL-2010 - Annex F1 - SDL-2010 formal definition: General overviewRick Reed
(Editor)

E-mail: rickreed@tseng.co.uk
Z.100 Annex F2Specification and Description Language - Overview of SDL-2010 - Annex F2 - SDL-2010 formal definition: Static semanticsRick Reed
(Editor)

E-mail: rickreed@tseng.co.uk
Z.100 Annex F3Specification and Description Language - Overview of SDL-2010 - Annex F3 - SDL-2010 formal definition: Dynamic semanticsRick Reed
(Editor)

E-mail: rickreed@tseng.co.uk
Z.161.4Testing and Test Control Notation version 3: TTCN-3 language extensions: Behaviour typesDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.162Testing and Test Control Notation version 3: TTCN-3 tabular presentation format (TFT)Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.163Testing and Test Control Notation version 3: TTCN-3 graphical presentation format (GFT)Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.164Testing and Test Control Notation version 3: TTCN-3 operational semanticsDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.167Testing and Test Control Notation version 3: TTCN-3 mapping from ASN.1Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.168Testing and Test Control Notation version 3: The IDL to TTCN-3 mappingDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.169Testing and Test Control Notation version 3: Using XML schema with TTCN-3Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.170Testing and Test Control Notation version 3: TTCN-3 documentation comment specificationDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.Imp100Specification and Description Language implementer's guide - Version 2.0.2Rick Reed
(Editor)

E-mail: rickreed@tseng.co.uk
Z.Suppl.1Supplement 1 to Z-series Recommendations - ITU-T Z.100-series - Supplement on methodology on the use of description techniquesRick Reed
(Editor)

E-mail: rickreed@tseng.co.uk