Committed to connecting the world


ITU-T Recommendations - Under Traditional Approval Process

The traditional approval process (TAP) is described in WTSA Resolution 1, section 9. Section 8 of the same Resolution defines how selection is done between the traditional approval process and the alternative approval process (AAP) (see ITU-T Recommendation A.8) for the development and approval of Recommendations.

TAP Recommendations Under Approval Process
RecommendationsDeterminedCircularStudy GroupTitle
D.264 2019-05-02 CIR 1673Shared use of spectrum and telecommunication infrastructure as possible methods for enhancing the efficiency of telecommunications
E.102 2019-02-28 CIR 1542Terms and definitions for disaster relief systems, network resilience and recovery
E.805 2019-05-16 CIR 17712Strategies to Establish Quality Regulatory Frameworks
G.9710 2019-07-12 CIR 18815Multi-gigabit fast access to subscriber terminals (MGfast) - Power spectral density specification
G.9964 Amd.3 2019-07-12 CIR 18815Unified high-speed wireline-based home networking transceivers - Power spectral density specification - Amendment 3
J.1012 2018-01-30 CIR 799Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; CA/DRM Container, Loader, Interfaces, Revocation
J.1013 2018-01-30 CIR 799Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; The Virtual Machine
J.1014 2018-01-30 CIR 799Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Advanced Security - ECI-specific functionalities
J.1015 2018-01-30 CIR 799Embedded Common Interface for exchangeable CA/DRM solutions; The Advanced Security system - Key Ladder Block
J.1015.1 2018-01-30 CIR 799Embedded Common Interface (ECI) for exchangeable CA/DRM solutions; Advanced Security system - Key Ladder block: Authentication of control word-usage rules information and associated data 1
X.1332 2019-09-05 -17Security guidelines for smart metering service in smart grids
X.1363 2019-09-05 -17Technical framework of personally identifiable information (PII) handling system in Internet of things (IoT) environment
X.1364 2019-09-05 -17Security requirements and framework for narrow band Internet of Things (IoT)
X.1365 2019-09-05 -17Security methodology for use of identity-based cryptography in support of IoT services over telecom networks
X.1371 2019-09-05 -17security threats in connected vehicles
X.1372 2019-09-05 -17Security guidelines for Vehicle-to-Everything (V2X) communication systems
X.1604 2019-09-05 -17Security requirements of network as a service (NaaS) in cloud computing
X.1605 2019-09-05 -17Security requirements of public infrastructure as a service (IaaS) in cloud computing
Y.4556 2018-12-13 CIR 16920Requirements and functional architecture of smart residential community

TAP Recommendations approved during Study Period
RecommendationsStatusCircularsApproval DateStudy GroupTitle
A.1In ForceC16-138/C16-198 2019-09-27 TSAGWorking methods for study groups of the ITU Telecommunication Standardization Sector
A.5In ForceC16-138/C16-198 2019-09-27 TSAGGeneric procedures for including references to documents of other organizations in ITU-T Recommendations
A.13In ForceC16-138/C16-198 2019-09-27 TSAGSupplements to ITU-T Recommendations
A.25 In ForceC16-138/C16-198 2019-09-27 TSAGGeneric procedures for incorporating text between ITU-T and other organizations
D.198In ForceC16-101/C16-166 2019-05-02 3Principles for a unified format of price/tariffs/rates lists used for exchanging telephone traffic
D.262In ForceC16-101/C16-166 2019-05-02 3Collaborative framework for OTTs
D.263In ForceC16-101/C16-166 2019-05-02 3Costs, charges and competition for mobile financial services (MFSs)
E.118 (2006) Amd. 1In ForceC16/115-C16-153 2019-02-28 2Revised registration form
E.119In ForceC15-250/C16-020 2017-04-07 2Requirements for safety confirmation and broadcast message service for disaster relief
E.169.1In ForceC16/115-C16-153 2019-02-28 2Application of Recommendation ITU-T E.164 numbering plan for universal international freephone numbers for international freephone service
E.217In ForceC16-063/C16-153 2019-02-28 2Maritime communications – Ship station identity
G.9700 (2014) Amd. 2SupersededC16-002/C16-040 2017-06-30 15-
G.9700In ForceC16-132/C16-187 2019-07-12 15Fast access to subscriber terminals ( - Power spectral density specification
G.9901In ForceC16-002/C16-040 2017-06-30 15Narrowband orthogonal frequency division multiplexing power line communication transceivers - Power spectral density specification
Q.5050In ForceC16-105/C16-159 2019-03-15 11Framework for solutions to combat counterfeit ICT devices
X.1042In ForceC16-113/C16-148 2019-01-30 17Security services using software-defined networking
X.1058In ForceC15-246/C16-023 2017-03-30 17Information technology - Security techniques - Code of practice for personally identifiable information protection
X.1080.0In ForceC15-246/C16-023 2017-03-30 17Access control for telebiometrics data protection
X.1126In ForceC15-246/C16-023 2017-03-30 17Guidelines on mitigating the negative effects of infected terminals in mobile networks
X.1127In ForceC15-052 2017-09-06 17Functional security requirements and architecture for mobile phone anti-theft measures
X.1212In ForceC15-246/C16-023 2017-03-30 17Design considerations for improved end-user perception of trustworthiness indicators
X.1213In ForceC15-052 2017-09-06 17Security capability requirements for countering smartphone-based botnets
X.1214In ForceC16-053/C16-085 2018-03-29 17Security assessment techniques in telecommunication/information and communication technology networks
X.1215In ForceC16-113/C16-148 2019-01-30 17Use cases for structured threat information expression
X.1248In ForceC15-052 2017-09-06 17Technical requirements for countering instant messaging spam
X.1249In ForceC16-113/C16-148 2019-01-30 17Technical framework for countering mobile in-application advertising spam
X.1331In ForceC16-053/C16-085 2018-03-29 17Security guidelines for home area network (HAN) devices in smart grid systems
X.1361In ForceC16-086/C16-114 2018-09-07 17Security framework for the Internet of things based on the gateway model
X.1362In ForceC15-246/C16-023 2017-03-30 17Simple encryption procedure for Internet of things (IoT) environments
X.1373In ForceC15-246/C16-023 2017-03-30 17Secure software update capability for intelligent transportation system communication devices
X.1541In ForceC15-052 2017-09-06 17Incident object description exchange format version 2
X.1550In ForceC15-246/C16-023 2017-03-30 17Access control models for incident exchange networks
X.1603In ForceC16-053/C16-085 2018-03-29 17Data security requirements for the monitoring service of cloud computing
Y.2773In ForceC15-233/C16-013 2017-02-17 13Performance models and metrics for deep packet inspection
Y.2774In ForceC16-077/C16-108 2019-03-14 13Functional requirements of deep packet inspection for future networks
Y.4500.2In ForceC16-072/C16-091 2018-05-06 20oneM2M – Requirements