ITU

Committed to connecting the world

ITU-T Recommendations - Under Traditional Approval Process

The traditional approval process (TAP) is described in WTSA Resolution 1, section 9. Section 8 of the same Resolution defines how selection is done between the traditional approval process and the alternative approval process (AAP) (see ITU-T Recommendation A.8) for the development and approval of Recommendations.

TAP Recommendations Under Approval Process
RecommendationsDeterminedCircularStudy GroupTitle
X.1211 2014-01-24 TSB-CIR-008117Capability requirements for preventing web-based attacks

TAP Recommendations approved during Study Period
RecommendationsStatusCircularsApproval DateStudy GroupTitle
A.23 Annex AIn ForceC15-085/C15-108 2014-06-20 TSAGGuide for ITU-T and ISO/IEC JTC1 cooperation
E.129In ForceC14-309/C15-009 2013-01-31 2Presentation of national numbering plans
E.161 (2001) Amd. 1In ForceC15-72/C15-104 2014-06-06 2New Annex A: Arrangement of digits, Korean character set and symbols
E.1110In ForceC14-309/C15-009 2013-01-31 2Allocation and assignment of ITU-T E.164 country code 888
G.9700In ForceC15-096 2014-04-04 15Fast access to subscriber terminals (FAST) - Power spectral density specification
G.9901 (2012) Amd. 1SupersededC15-008/C15-046 2013-07-12 15-
G.9901In ForceC15-069/C15-096 2014-04-04 15Narrowband orthogonal frequency division multiplexing power line communication transceivers - Power spectral density specification
X.1154In ForceC14-311/C15-023 2013-04-26 17General framework of combined authentication on multiple identity service provider environments
X.1208In ForceC15-024/C15-56/C15-057/C15-080 2014-01-24 17A cybersecurity indicator of risk to enhance confidence and security in the use of telecommunication/information and communication technologies
X.1210In ForceC15-052/C15-080 2014-01-24 17Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks
X.1243 (2010) Cor. 1In ForceC15-052/C15-080 2014-01-24 17-
X.1255In ForceC15-024/C15-053 2013-09-04 17Framework for discovery of identity management information
X.1520In ForceC15-052/C15-080 2014-01-24 17Common vulnerabilities and exposures
X.1526SupersededC14-311/C15-023 2013-04-26 17Open Vulnerability and Assessment Language
X.1526In ForceC15-052/C15-080 2014-01-24 17Language for the open definition of vulnerabilities and for the assessment of a system state
X.1544In ForceC14-311/C15-023 2013-04-26 17Common attack pattern enumeration and classification
X.1546In ForceC15-052/C15-080 2014-01-24 17Malware attribute enumeration and characterization
X.1582In ForceC15-052/C15-080 2014-01-24 17Transport protocols supporting cybersecurity information exchange
X.1601In ForceC15-052/C15-080 2014-01-24 17Security framework for cloud computing
Y.1271In ForceC15-090/C15-110 2014-07-18 13Framework(s) on network requirements and capabilities to support emergency telecommunications over evolving circuit-switched and packet-switched networks
Y.2705In ForceC14-302/C15-016 2013-03-01 13Minimum security requirements for the interconnection of the Emergency Telecommunications Service (ETS)
Y.2723In ForceC15-021/C15-067 2013-11-15 13Support for OAuth in next generation networks
Y.2724In ForceC15-021/C15-067 2013-11-15 13Framework for supporting OAuth and OpenID in next generation networks
Y.2725In ForceC15-076/C15-110 2014-07-18 13Support of OpenID in next generation networks
Y.2771In ForceC15-090/C15-110 2014-07-18 13Framework for deep packet inspection