ITU-T Recommendations - Under Traditional Approval Process
The traditional approval process (TAP) is described in
WTSA Resolution 1, section 9. Section 8 of the same Resolution defines
how selection is done between the traditional approval process and the alternative
approval process (AAP) (see
ITU-T Recommendation
A.8) for the development and approval of Recommendations.
| TAP Recommendations Under Approval Process |
| Recommendations | Determined | Circular | Study Group | Title |
| X.1127 |
2017-03-30
| CIR 29 | 17 | Functional security requirements and architecture for mobile phone anti-theft measures |
| X.1213 |
2017-03-30
| CIR 29 | 17 | Security capability requirements for countering smartphone-based botnets |
| X.1248 |
2017-03-30
| CIR 29 | 17 | Technical requirements for countering instant messaging spam |
| X.1541rev |
2017-03-30
| CIR 29 | 17 | Incident object description exchange format version 2 |
| Y.4454 |
2016-08-05
| CIR 238 | 20 | Platforms interoperability for smart cities |
|
TAP Recommendations approved during Study Period
|
| Recommendations | Status | Circulars | Approval Date | Study Group | Title |
| E.119 | In Force | C15-250/C16-020 |
2017-04-07
| 2 | Requirements for safety confirmation and broadcast message service for disaster relief |
| X.1058 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Information technology - Security techniques - Code of practice for personally identifiable information protection |
| X.1080.0 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Access control for telebiometrics data protection |
| X.1126 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Guidelines on mitigating the negative effects of infected terminals in mobile networks |
| X.1212 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Design considerations for improved end-user perception of trustworthiness indicators |
| X.1362 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Simple encryption procedure for Internet of things (IoT) environments |
| X.1373 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Secure software update capability for intelligent transportation system communication devices |
| X.1550 | In Force | C15-246/C16-023 |
2017-03-30
| 17 | Access control models for incident exchange networks |
| Y.2773 | In Force | C15-233/ |
2017-02-17
| 13 | Performance models and metrics for deep packet inspection |