Committed to connecting the world

ITU 150

List of Editors

ITEMTITLEEDITOR
e-X.Imp500Directory Implemeneter's GuideErik Andersen
(Editor)

E-mail: era@x500.eu
X.226 Cor.1Information Technology - Open Systems Interconnection - Connection-Oriented Presentation Protocol: Protocol SpecificationJean-Paul Lemaire
(Editor)

E-mail: jean-paul.lemaire@univ-paris-diderot.fr
X.227 bis Cor.1Information technology - Open Systems Interconnection - Connection-mode protocol for the Application Service Object Association Control Service ElementJean-Paul Lemaire
(Editor)

E-mail: jean-paul.lemaire@univ-paris-diderot.fr
X.500 (eighth edition)Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and servicesErik Andersen
(Editor)

E-mail: era@x500.eu
X.501 (eighth edition)Information technology - Open Systems Interconnection - The Directory - ModelsErik Andersen
(Editor)

E-mail: era@x500.eu
X.509 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Public-key and attribute certificate frameworksErik Andersen
(Editor)

E-mail: era@x500.eu
X.509 Cor.1Information technology - Open Systems Interconnection - The Directory - Public-key and attribute certificate frameworks - Technical Corrigendum 1Erik Andersen
(Editor)

E-mail: era@x500.eu
X.511 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Abstract Service DefinitionErik Andersen
(Editor)

E-mail: era@x500.eu
X.518 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Procedures for Distributed OperationsErik Andersen
(Editor)

E-mail: era@x500.eu
X.519 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Protocols specificationsErik Andersen
(Editor)

E-mail: era@x500.eu
X.520 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Selected Attribute TypesErik Andersen
(Editor)

E-mail: era@x500.eu
X.521 (eighth edition)Information technology - Open Systems Interconnection - The Directory - Selected object classesErik Andersen
(Editor)

E-mail: era@x500.eu
X.525 (eighth edition)Information technology - Open Systems Interconnection - The Directory - ReplicationErik Andersen
(Editor)

E-mail: era@x500.eu
X.675OID-based resolution framework for heterogeneous identifiers and locatorsYounghwan Choi
(Editor)

E-mail: yhc@etri.re.kr
X.680Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notationPaul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.681Information technology - Abstract Syntax Notation One (ASN.1): Information object specificationPaul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.682Information technology - Abstract Syntax Notation One (ASN.1): Constraint specificationPaul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.683Information technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specificationsPaul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.690Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)Paul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.691Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)Paul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.692Information technology - ASN.1 encoding rules: Specification of Encoding Control Notation (ECN)Paul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.693Information technology - ASN.1 encoding rules: XML Encording Rules (XER)Paul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.694Information technology - ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1Paul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.695Information technology - ASN.1 encoding rules: Registration and application of PER encoding instructionsPaul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.696Information technology - ASN.1 encoding rules: Specification of Octet Encoding Rules (OER)Paul Thorpe
(Editor)

E-mail: thorpe@oss.com
X.1051revInformation technology - Security techniques - Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizationsWataru Senga
(Editor)

E-mail: wa-senga@kddi.com


Kyeong Hee Oh
(Editor)

E-mail: khoh@tcaservices.kr
X.1157Technical capabilities of fraud detection and response for services with high assurance level requirementsHyung-jin Lim
(Editor)

E-mail: hjlim@fsa.or.kr


Tae-Kyung Kim
(Editor)

E-mail: tkkim@stu.ac.kr
X.1163Security requirements and mechanisms of peer-to-peer-based telecommunication networksLijun Liu
(Editor)

E-mail: liulijun@chinamobile.com


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr
X.1246Technologies involved in countering voice spam in telecommunication organizationsXuetao Du
(Editor)

E-mail: duxuetao@cmdi.chinamobile.com


Tao Lou
(Editor)

X.1255supSupplement to Recommendation ITU-T X.1255, Proposed conceptual models based on ITU-T X.1255 frameworksAbbie Barbir
(Editor)

E-mail: abbie.barbir@bankofamerica.com
X.1341Certified mail transport and certified post office protocolsDavid Keller
(Editor)

E-mail: david.keller@legalbox.com


Laura Prin
(Editor)

E-mail: laura.prin@legalbox.com
X.1500 Amd.8Overview of cybersecurity information exchange - Amendment 7 - Revised structured cybersecurity information exchange techniquesYouki Kadobayashi
(Editor)

E-mail: youki-k@is.aist-nara.ac.jp
X.1601Security framework for cloud computingNan Meng
(Editor)

E-mail: mengnan@catr.cn


Huirong Tian
(Editor)

E-mail: tianhuirong@mail.ritt.com.cn
X.1631Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud servicesKoji Nakao
(Editor)

E-mail: ko-nakao@kddi.com


Huirong Tian
(Editor)

E-mail: tianhuirong@mail.ritt.com.cn
X.authiGuidelines and framework for sharing network authentication results with service applicationsMin Zuo
(Editor)

E-mail: zuomin@chinamobile.com


Lijun Liu
(Editor)

E-mail: liulijun@chinamobile.com
X.bhsmInformation technology - Security Techniques - Telebiometric authentication framework using biometric hardware security moduleYong Nyuo Shin
(Editor)

E-mail: ynshin@hycu.ac.kr


Myung Geun Chun
(Editor)

E-mail: mgchun@chungbuk.ac.kr
X.cmsInformation technology - Generic applications of ASN.1: Cryptographic Message Syntax (CMS)Jean-Paul Lemaire
(Editor)

E-mail: jean-paul.lemaire@univ-paris-diderot.fr
X.cogentDesign considerations for improved end-user perception of trustworthiness indicatorsYouki Kadobayashi
(Editor)

E-mail: youki-k@is.aist-nara.ac.jp


Daisuke Miyamoto
(Editor)

E-mail: daisu-mi@nc.u-tokyo.ac.jp
X.CSCDataSecGuidelines for cloud service customer data securityHuirong Tian
(Editor)

E-mail: tianhuirong@mail.ritt.com.cn


Nan Meng
(Editor)

E-mail: mengnan@catr.cn
X.cspimTechnical requirements for countering instant messaging spam (SPIM)Huamin Jin
(Editor)

E-mail: jhm@gsta.com;


Zhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Shuai Wang
(Editor)

E-mail: wangs@gsta.com
X.eaaaEnhanced entity authentication based on aggregated attributesTae-Kyung Kim
(Editor)

E-mail: tkkim@stu.ac.kr


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.gcsfmpdSupplement to ITU-T Rec. X.1231 on guidance of countering spam for mobile phone developersTae-Jin Lee
(Editor)

E-mail: tjlee@kisa.or.kr


Jeong-Jun Suh
(Editor)

E-mail: jjun2@kisa.or.kr
X.gcspiSupplement to ITU-T X.1242, Guideline for countermeasures against short message service (SMS) phishing incidentsLijun Liu
(Editor)

E-mail: liulijun@chinamobile.com


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Deawoo Park
(Editor)

E-mail: porf_pdw@naver.com
X.gosccGuidelines of operational security for cloud computingMing He
(Editor)

E-mail: hem@gsta.com


Zhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Jun Shen
(Editor)

E-mail: shenjun@gsta.com


Huirong Tian
(Editor)

E-mail: tianhuirong@mail.ritt.com.cn


Laifu Wang
(Editor)

E-mail: wanglf@gsta.com
X.gpimInformation technology - Security techniques - Code of practice for Personally Identifiable Information protectionHeung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr


Soonjoung Byun
(Editor)

E-mail: sjbyun@kisa.or.kr


Lijun Liu
(Editor)

E-mail: liulijun@chinamobile.com
X.gsiisoGuidelines on security of the individual information service for operatorsJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Bo Yu
(Editor)

E-mail: yubo49@chinaunicom.cn
X.iamtIdentity and access management taxonomyRadu Marian
(Editor)

E-mail: radu.marian@baml.com
X.iotsec-1Simple encryption procedure for IoT device securityHirotaka Yoshida
(Editor)

E-mail: hirotaka.yoshida.qv@hitachi.com
X.iotsec-2Security framework for Internet of ThingsJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr
X.itssec-1Secure software update capability for ITS communications devicesMasashi Eto
(Editor)

E-mail: eto@nict.go.jp


Koji Nakao
(Editor)

E-mail: ko-nakao@kddi.com
X.itssec-2Security guidelines for V2X communication systemsSang-Woo Lee
(Editor)

E-mail: ttomlee@etri.re.kr


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr
X.msec-7Guidelines on the management of infected terminals in mobile networksXuetao Du
(Editor)

E-mail: duxuetao@cmdi.chinamobile.com


Lou Tao
(Editor)

E-mail: loutao@chinamobile.com


Chen Zhang
(Editor)

E-mail: zhangchen@cmdi.chinamobile.com
X.msec-9Functional security requirements and architecture for mobile phone anti-theft measuresJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr
X.nessaAccess control models for incidents exchange networksAlexey Koshka
(Editor)

E-mail: biocheshire@yandex.ru
X.oiddevInformation technology - Use of object identifiers to identify devices in the Internet of ThingsJun Seob Lee
(Editor)

E-mail: juns@etri.re.kr
X.oid-iotSupplement to ITU-T X-series - ITU-T X.660 - Guidelines for using object identifiers for the Internet of ThingsZhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Dongya Wu
(Editor)

E-mail: wudy@cesi.cn
X.pbactPrivacy-based access control in TelebiometricsErik Andersen
(Editor)

E-mail: era@x500.eu


Michele Peiry
(Editor)

E-mail: michele.peiry@hotmail.com
X.pki-emInformation Technology - Public-Key Infrastructure: Establishment and maintenanceErik Andersen
(Editor)

E-mail: era@x500.eu
X.pki-profInformation Technology - Public-Key Infrastructure: ProfileErik Andersen
(Editor)

E-mail: era@x500.eu
X.samtnSecurity assessment techniques in telecommunication/ICT networksByoung-Moon Chin
(Editor)

E-mail: bmchin@tta.or.kr


Vibha Tomar
(Editor)

E-mail: dirngn.tec@gov.in
X.sap-5Guideline on local linkable anonymous authentication for electronic servicesSokjoon Lee
(Editor)

E-mail: junny@etri.re.kr
X.sbbSecurity capability requirements for countering smartphone-based botnetsHeung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Bo Yu
(Editor)

E-mail: yubo49@chinaunicom.cn
X.sdnsec-1Security services using the software-defined networkingHyoungshick Kim
(Editor)

E-mail: hyoung@skku.edu


Jung Soo Park
(Editor)

E-mail: pjs@etri.re.kr
X.sdnsec-2Security requirements and reference architecture for Software-Defined NetworkingZhiyuan Hu
(Editor)

E-mail: Zhiyuan.Hu@alcatel-sbell.com.cn


Zhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn
X.sfcseSecurity requirements for SaaS application environmentsXiaoming Guang
(Editor)

E-mail: guangxm@ctbri.com.cn


Zhaoji (George) Lin
(Editor)

E-mail: lin.zhaoji@zte.com.cn


Peng Zhao
(Editor)

E-mail: zhaopeng@ctbri.com.cn


Ruoni Wang
(Editor)

E-mail: wangrn@ctbri.com.cn
X.sgmvnoSupplement to ITU-T X.805 Security guideline for mobile virtual network operator (MVNO)Hongwei Luo
(Editor)

E-mail: luohongwei@chinattl.com


Laifu Wang
(Editor)

E-mail: wanglf@gsta.com
X.sgsec-1Security functional architecture for smart grid services using telecommunication networksMi Joo Kim
(Editor)

E-mail: mijoo.kim@kisa.or.kr


Miyeon Yoon
(Editor)

E-mail: myyoon@kisa.or.kr


Jeong-Jun Suh
(Editor)

E-mail: jjun2@kisa.or.kr
X.sgsec-2Security guidelines for home area network (HAN) devices in smart grid systemsHaeryong Park
(Editor)

E-mail: hrpark@kisa.or.kr


Woong Go
(Editor)

E-mail: wgo@kisa.or.kr


Jeong-Jun Suh
(Editor)

E-mail: jjun2@kisa.or.kr
X.sgsmInformation security management guidelines for small and medium telecommunication organizationsChang-Oh Kim
(Editor)

E-mail: ispiadviser@gmail.com


Wataru Senga
(Editor)

E-mail: wa-senga@kddi.com
X.simefSession information message exchange format (SIMEF)Ik-Kyun Kim
(Editor)

E-mail: jhk@etri.re.kr


Jong-Hyun Kim
(Editor)

E-mail: jhk@etri.re.kr
X.sup-gpimSupplement to ITU-T X.gpim Code of practice for personally identifiable information protection based on ITU-T X.gpim for telecommunications organizationsLijun Liu
(Editor)

E-mail: liulijun@chinamobile.com


Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr


Jae Nam Ko
(Editor)

E-mail: freeinlove1127@gmail.com
X.tamA guideline to technical and operational countermeasures for telebiometric applications using mobile devicesJason Kim
(Editor)

E-mail: jskim@kisa.or.kr


Yong Nyuo Shin
(Editor)

E-mail: ynshin@hycu.ac.kr
X.tfcmmTechnical framework for countering mobile messaging spamJunjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn


Zhu Annan
(Editor)

E-mail: zhuan3@chinaunicom.cn


Gao Feng
(Editor)

E-mail: gaofeng149@chinaunicom.cn


Laifu Wang
(Editor)

E-mail: wanglf@gsta.com
X.th2Telebiometrics related to physicsMichele Peiry
(Editor)

E-mail: michele.peiry@hotmail.com
X.th3Telebiometrics related to chemistryMichele Peiry
(Editor)

E-mail: michele.peiry@hotmail.com
X.th4Telebiometrics related to biologyPaul Gerome
(Editor)

E-mail: drdrpaul@gmail.com
X.th5Telebiometrics related to culturologyPaul Gerome
(Editor)

E-mail: drdrpaul@gmail.com
X.th6Telebiometrics related to psychologyPaul Gerome
(Editor)

E-mail: drdrpaul@gmail.com
X.th13Holosphere to biosphere secure data acquisition and telecommunication protocolOlivier Vuillemin
(Editor)

E-mail: olivier@vuillemin.ch
X.ticscSupplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTEChen Zhang
(Editor)

E-mail: zhangchen@cmdi.chinamobile.com


Bo Yu
(Editor)

E-mail: yubo49@chinaunicom.cn


Cie Yuan
(Editor)

E-mail: yuanjie@chinamobile.com
X.tigscTechnical implementation guidelines for ITU-T X.805Heung Youl Youm
(Editor)

E-mail: hyyoum@sch.ac.kr
X.TRSM6edTechnical Report Security in telecommunications and information technology - An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications; 6th editionMike Harrop
(Editor)

E-mail: mharrop@bcs.org
X.TRsussTechnical Report on the successful use of security standardsMohamed M. K. Elhaj
(Editor)

E-mail: mohamed.elhaj@ntc.org.sd
X.websec-6Security framework and requirements for open capabilities of telecommunication servicesGao Feng
(Editor)

E-mail: gaofeng149@chinaunicom.cn


Jae Hoon Nah
(Editor)

E-mail: jhnah@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
X.websec-7Reference monitor for online analytics servicesHyung-jin Lim
(Editor)

E-mail: hjlim@fsa.or.kr


Jongyoul Park
(Editor)

E-mail: jongyoul@etri.re.kr


Junjie Xia
(Editor)

E-mail: xiajj2@chinaunicom.cn
Z.161Testing and Test Control Notation version 3: TTCN-3 core languageDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.161.1Testing and Test Control Notation version 3: TTCN-3 language extensions: Support of interfaces with continuous signalsDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.161.2Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment supportDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.161.3Testing and Test Control Notation version 3: TTCN-3 language extensions: Advanced parameterizationDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.161.4Testing and Test Control Notation version 3: TTCN-3 language extensions: Behaviour typesDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.161.5Testing and Test Control Notation version 3: TTCN-3 Language extensions: Performance and real time testingDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.162Testing and Test Control Notation version 3: TTCN-3 tabular presentation format (TFT)Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.163Testing and Test Control Notation version 3: TTCN-3 graphical presentation format (GFT)Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.164Testing and Test Control Notation version 3: TTCN-3 operational semanticsDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.165Testing and Test Control Notation version 3: TTCN-3 runtime interface (TRI)Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.165.1Testing and Test Control Notation version 3: TTCN-3 language extensions: Extended TRIDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.166Testing and Test Control Notation version 3: TTCN-3 control interface (TCI)Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.167Testing and Test Control Notation version 3: TTCN-3 mapping from ASN.1Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.168Testing and Test Control Notation version 3: The IDL to TTCN-3 mappingDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.169Testing and Test Control Notation version 3: Using XML schema with TTCN-3Dieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de
Z.170Testing and Test Control Notation version 3: TTCN-3 documentation comment specificationDieter Hogrefe
(Editor)

E-mail: hogrefe@informatik.uni-goettingen.de