International Telecommunication Union   ITU
Français  Español
 
Site map Contact us Print version
  Home : ITU-T : Publications : Recommendations : X Series
Recently posted -  Search Recommendations
   
Data networks, open system communications and security
XML RSS Feed RSS

X.1

International user classes of service in, and categories of access to, public data networks and Integrated Services Digital Networks (ISDNs)  

X.2

International data transmission services and optional user facilities in public data networks and ISDNs  

X.3

Packet Assembly/Disassembly facility (PAD) in a public data network  

X.4

General structure of signals of International Alphabet No. 5 code for character oriented data transmission over public data networks  

X.5

Facsimile Packet Assembly/Disassembly facility (FPAD) in a public data network  

X.6

Multicast service definition  

X.7

Technical characteristics of data transmission services  

X.8

Multi-aspect PAD (MAP) framework and service definition  

X.10

[Withdrawn] Categories of access for Data Terminal Equipment (DTE) to public data transmission services  
Deleted as its content is fully covered by ITU-T X.1

X.15

[Withdrawn] Definitions of terms concerning public data networks  
Withdrawn on 25.11.1988

X.20

Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for start-stop transmission services on public data networks  

X.20bis

Use on public data networks of Data Terminal Equipment (DTE) which is designed for interfacing to asynchronous duplex V-Series modems  

X.21

Interface between Data Terminal Equipment and Data Circuit-terminating Equipment for synchronous operation on public data networks  

X.21bis

Use on public data networks of Data Terminal Equipment (DTE) which is designed for interfacing to synchronous V-Series modems  

X.22

Multiplex DTE/DCE interface for user classes 3-6  

X.24

List of definitions for interchange circuits between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) on public data networks  

X.25

Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and connected to public data networks by dedicated circuit  

X.26

Electrical characteristics for unbalanced double-current interchange circuits operating at data signalling rates nominally up to 100 kbit/s  
This Recommendation is published under alias number V.10

X.27

Electrical characteristics for balanced double-current interchange circuits operating at data signalling rates up to 10 Mbit/s  
This Recommendation is published under alias number V.11

X.28

DTE/DCE interface for a start-stop mode Data Terminal Equipment accessing the Packet Assembly/Disassembly facility (PAD) in a public data network situated in the same country  

X.29

Procedures for the exchange of control information and user data between a Packet Assembly/Disassembly (PAD) facility and a packet mode DTE or another PAD  

X.30

Support of X.21, X.21 bis and X.20 bis based Data Terminal Equipments (DTEs) by an Integrated Services Digital Network (ISDN)  
This Recommendation is also included but not published in I series under alias number I.461

X.31

Support of packet mode terminal equipment by an ISDN  
This Recommendation is also included but not published in I series under alias number I.462

X.32

Interface between Data terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for terminals operating in the packet mode and accessing a Packet-Switched Public Data Network through a public switched telephone network or an Integrated Services Digital Network or a Circuit-Switched Public Data Network  

X.33

Access to packet-switched data transmission services via frame relaying data transmission services  

X.34

Access to packet-switched data transmission services via B-ISDN  

X.35

Interface between a PSPDN and a private PSDN which is based on X.25 procedures and enhancements to define a gateway function that is provided in the PSPDN  

X.36

Interface between Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) for public data networks providing frame relay data transmission service by dedicated circuit  

X.37

Encapsulation in X.25 packets of various protocols including frame relay  

X.38

G3 facsimile equipment/DCE interface for G3 facsimile equipment accessing the Facsimile Packet Assembly/Disassembly facility (FPAD) in a public data network situated in the same country  

X.39

Procedures for the exchange of control information and user data between a Facsimile Packet Assembly/Disassembly (FPAD) facility and a packet mode Data Terminal Equipment (DTE) or another FPAD  

X.40

[Withdrawn] Standardization of frequency-shift modulated transmission systems for the provision of telegraph and data channels by frequency division of a group  
Withdrawn on 12.03.1993

X.42

Procedures and methods for accessing a public data network from a DTE operating under control of a generalized polling protocol  

X.45

Interface between data terminal equipment (DTE) and data circuit-terminating equipment (DCE) for terminals operating in the packet mode and connected to public data networks, designed for efficiency at higher speeds  

X.46

Access to FRDTS via B-ISDN  

X.48

Procedures for the provision of a basic multicast service for data terminal equipments (DTEs) using Recommendation X.25  

X.49

Procedures for the provision of an extended multicast service for data terminal equipments (DTEs) using Recommendation X.25  

X.50

Fundamental parameters of a multiplexing scheme for the international interface between synchronous data networks  

X.50bis

Fundamental parameters of a 48-kbit/s user data signalling rate transmission scheme for the international interface between synchronous data networks  

X.51

Fundamental parameters of a multiplexing scheme for the international interface between synchronous data networks using 10-bit envelope structure  

X.51bis

Fundamental parameters of a 48-kbit/s user data signalling rate transmission scheme for the international interface between synchronous data networks using 10-bit envelope structure  

X.52

Method of encoding anisochronous signals into a synchronous user bearer  

X.53

Numbering of channels on international multiplex links at 64 kbit/s  

X.54

Allocation of channels on international multiplex links at 64 kbit/s  

X.55

Interface between synchronous data networks using a 6 + 2 envelope structure and single channel per carrier (SCPC) satellite channels  

X.56

Interface between synchronous data networks using an 8 + 2 envelope structure and single channel per carrier (SCPC) satellite channels  

X.57

Method of transmitting a single lower speed data channel on a 64 kbit/s data stream  

X.58

Fundamental parameters of a multiplexing scheme for the international interface between synchronous non-switched data networks using no envelope structure  

X.60

Common channel signalling for circuit-switched data applications  

X.61

[Withdrawn] Signalling System No. 7 - Data user part  
This Recommendation is also included but not published in Q series under alias number Q.741

X.70

Terminal and transit control signalling system for start-stop services on international circuits between anisochronous data networks  

X.71

Decentralized terminal and transit control signalling system on international circuits between synchronous data networks  

X.75

Packet-switched signalling system between public networks providing data transmission services  

X.76

Network-to-network interface between public networks providing PVC and/or SVC frame relay data transmission service  

X.77

Interworking between PSPDNs via B-ISDN  

X.78

Interworking procedures between networks providing frame relay data transmission services via B-ISDN  

X.80

Interworking of interexchange signalling systems for circuit-switched data services  

X.81

Interworking between an ISDN circuit-switched and a circuit-switched public data network (CSPDN)  

X.82

Detailed arrangements for interworking between CSPDNs and PSPDNs based on Recommendation T.70  

X.84

Support of frame relay services over MPLS core networks  

X.85

IP over SDH using LAPS  

X.86

Ethernet over LAPS  

X.87

Multiple services ring based on RPR  

X.92

Hypothetical reference connections for public synchronous data networks  

X.96

Call progress signals in public data networks  

X.110

International routing principles and routing plan for Public Data Networks  

X.111

Principles for the routing of international frame relay traffic  

X.115

Definition of address translation capability in public data networks  

X.116

Address translation registration and resolution protocol  

X.121

International numbering plan for public data networks  

X.122

Numbering plan interworking for the E.164 and X.121 numbering plans  
This Recommendation is published with the double number E.166 and X.122. For more details see E.166

X.123

Mapping between escape codes and TOA/NPI for E.164/X.121 numbering plan interworking during the transition period  

X.124

Arrangements for the interworking of the E.164 and X.121 numbering plans for frame relay and ATM networks  

X.125

Procedure for the notification of the assignment of international network identification codes for public frame relay data networks and ATM networks numbered under the E.164 numbering plan  

X.130

Call processing delays in public data networks when providing international synchronous circuit-switched data services  

X.131

Call blocking in public data networks when providing international synchronous circuit-switched data services  

X.134

Portion boundaries and packet-layer reference events: basis for defining packet-switched performance parameters  

X.135

Speed of service (delay and throughput) performance values for public data networks when providing international packet-switched services  

X.136

Accuracy and dependability performance values for public data networks when providing international packet-switched services  

X.137

Availability performance values for public data networks when providing international packet-switched services  

X.138

Measurement of performance values for public data networks when providing international packet-switched services  

X.139

Echo, drop, generator and test DTEs for measurement of performance values in public data networks when providing international packet-switched services  

X.140

General quality of service parameters for communication via public data networks  

X.141

General principles for the detection and correction of errors in public data networks  
A Corrigendum was indicated in 06/1990 for the English version.

X.142

Quality of service metrics for characterizing Frame Relay/ATM service interworking performance  

X.144

User information transfer performance parameters for public frame relay data networks  

X.145

Connection establishment and disengagement performance parameters for public Frame Relay data networks providing SVC services  

X.146

Performance objectives and quality of service classes applicable to frame relay  

X.147

Frame Relay network availability  

X.148

Procedures for the measurement of the performance of public data networks providing the international frame relay service  

X.149

Performance of IP networks when supported by public Frame Relay data networks  

X.150

Principles of maintenance testing for public data networks using Data Terminal Equipment (DTE) and Data Circuit-terminating Equipment (DCE) test loops  

X.151

Frame Relay operations and maintenance - Principles and functions  

X.160

Architecture for customer network management service for public data networks  

X.Imp160

Customer Network Management Implementors' Guide - Defects and Resolutions  

X.161

Definition of customer network management services for public data networks  

X.162

Definition of management information for customer network management service for public data networks to be used with the CNMc interface  

X.163

Definition of management information for customer network management service for public data networks to be used with the CNMe interface  

X.170

Network-network management architecture for data networks  

X.171

Network-network management services for data networks  

X.180

Administrative arrangements for international closed user groups (CUGs)  

X.181

Administrative arrangements for the provision of international permanent virtual circuits (PVCs)  

X.200

Information technology - Open Systems Interconnection - Basic Reference Model: The basic model  

X.Imp200

OSI Implementers' Guide - Version 1.1  

X.207

Information technology - Open Systems Interconnection - Application layer structure  

X.208

[Withdrawn] Specification of Abstract Syntax Notation One (ASN.1)  

X.209

[Withdrawn] Specification of Basic Encoding Rules for Abstract Syntax Notation One (ASN.1)  

X.210

Information technology - Open Systems Interconnection - Basic Reference Model: Conventions for the definition of OSI services  

X.211

Information technology - Open Systems Interconnection - Physical service definition  

X.212

Information technology - Open Systems Interconnection - Data Link service definition  

X.213

Information technology - Open Systems Interconnection - Network service definition  

X.214

Information technology - Open Systems Interconnection -Transport service definition  

X.215

Information technology - Open Systems Interconnection - Session service definition  

X.216

Information technology - Open Systems Interconnection - Presentation service definition  

X.217

Information technology - Open Systems Interconnection - Service definition for the Association Control Service Element  

X.217bis

Information technology - Open Systems Interconnection - Service definition for the Application Service Object Association Control Service Element  

X.218

Reliable Transfer: Model and service definition  

X.219

Remote Operations: Model, notation and service definition  

X.220

Use of X.200-Series protocols in CCITT applications  

X.222

Use of X.25 LAPB-compatible Data Link procedures to provide the OSI connection-mode Data Link service  
This title results from the modification of ITU-T X.222 (04/95) former title by Amendment 1 (10/96).

X.223

Use of X.25 to provide the OSI connection-mode Network service for ITU-T applications  

X.224

Information technology - Open Systems Interconnection - Protocol for providing the connection-mode transport service  

X.225

Information technology - Open Systems Interconnection - Connection-oriented Session protocol: Protocol specification  

X.226

Information technology - Open Systems Interconnection - Connection-oriented Presentation protocol: Protocol specification  

X.227

Information technology - Open Systems Interconnection - Connection-oriented protocol for the Association Control Service Element: Protocol specification  

X.227bis

Information technology - Open Systems Interconnection - Connection-mode protocol for the Application Service Object Association Control Service Element  

X.228

Reliable Transfer: Protocol specification  

X.229

Remote Operations: Protocol specification  

X.233

Information technology - Protocol for providing the connectionless-mode network service: Protocol specification  

X.234

Information technology - Protocol for providing the OSI connectionless-mode transport service  

X.235

Information technology - Open Systems Interconnection - Connectionless Session protocol: Protocol specification  

X.236

Information technology - Open Systems Interconnection - Connectionless Presentation protocol: Protocol specification  

X.237

Information technology - Open Systems Interconnection - Connectionless protocol for the Association Control Service Element: Protocol specification  

X.237bis

Information technology - Open Systems Interconnection - Connectionless protocol for the Application Service Object Association Control Service Element  

X.244

[Withdrawn] Procedure for the exchange of protocol identification during virtual call establishment on Packet Switched Public Data Networks  
Superseded by the more comprehensive description of protocol identifiers contained in X.263

X.245

Information technology - Open Systems Interconnection - Connection-oriented Session protocol: Protocol Implementation Conformance Statement (PICS) proforma  

X.246

Information technology - Open Systems Interconnection - Connection-oriented Presentation protocol: Protocol Implementation Conformance Statement (PICS) proforma  

X.247

Information technology - Open Systems Interconnection - Protocol specification for the Association Control Service Element: Protocol Implementation Conformance Statement (PICS) proforma  

X.248

Information technology - Open Systems Interconnection - Reliable Transfer: Protocol Implementation Conformance Statement (PICS) proforma  

X.249

Information technology - Open Systems Interconnection - Remote Operations: Protocol Implementation Conformance Statement (PICS) proforma  

X.255

Information technology - Open Systems Interconnection - Connectionless Session protocol: Protocol Implementation Conformance Statement (PICS) proforma  

X.256

Information technology - Open Systems Interconnection - Connectionless Presentation protocol: Protocol Implementation Conformance Statement (PICS) proforma  

X.257

Information technology - Open Systems Interconnection - Connectionless protocol for the Association Control Service Element: Protocol Implementation Conformance Statement (PICS) proforma  

X.260

Information technology - Framework for protocol identification and encapsulation  

X.263

Information technology - Protocol identification in the Network Layer  

X.264

Transport protocol identification mechanism  

X.272

Data compression and privacy over frame relay networks  

X.273

Information technology - Open Systems Interconnection - Network layer security protocol  

X.274

Information technology - Telecommunication and information exchange between systems - Transport layer security protocol  

X.281

Information technology - Elements of management information related to the OSI Physical Layer  

X.282

Elements of management information related to the OSI Data Link layer  

X.283

Information technology - Elements of management information related to the OSI Network layer  

X.284

Information technology - Elements of management information related to the OSI Transport layer  

X.287

Information technology - Open Systems Interconnection - Structure of management information: Managed objects for supporting upper layers  

X.290

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - General concepts  

X.291

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Abstract test suite specification  

X.292

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - The Tree and Tabular Combined Notation (TTCN)  

X.293

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Test realization  

X.294

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Requirements on test laboratories and clients for the conformance assessment process  

X.295

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Protocol profile test specification  

X.296

OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications - Implementation conformance statements  

X.300

General principles for interworking between public networks and between public networks and other networks for the provision of data transmission services  

X.301

Description of the general arrangements for call control within a subnetwork and between subnetworks for the provision of data transmission services  

X.302

Description of the general arrangements for internal network utilities within a subnetwork and intermediate utilities between subnetworks for the provision of data transmission services  

X.305

Functionalities of subnetworks relating to the support of the OSI connection-mode network service  

X.320

General arrangements for interworking between Integrated Services Digital Networks (ISDNs) for the provision of data transmission services  

X.321

General arrangements for interworking between Circuit-Switched Public Data Networks (CSPDNs) and Integrated Services Digital Networks (ISDNs) for the provision of data transmission services  
This Recommendation is also included but not published in I series under alias number I.540

X.322

General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and Circuit-Switched Public Data Networks (CSPDNs) for the provision of data transmission services  

X.323

General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs)  

X.324

General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and public mobile systems for the provision of data transmission services  

X.325

General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and Integrated Services Digital Networks (ISDNs) for the provision of data transmission services  
This Recommendation is also included but not published in I series under alias number I.550

X.326

General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and Common Channel Signalling Network (CCSN)  

X.327

General arrangements for interworking between Packet-Switched Public Data Networks (PSPDNs) and private data networks for the provision of data transmission services  

X.328

General arrangements for interworking between Public Data Networks providing frame relay data transmission services and Integrated Services Digital Networks (ISDNs) for the provision of data transmission services  

X.329

General arrangements for interworking between networks providing frame relay data transmission services and B-ISDN  

X.340

General arrangements for interworking between a Packet-Switched Public Data Network (PSPDN) and the international telex network  

X.350

General interworking requirements to be met for data transmission in international public mobile satellite systems  

X.351

Special requirements to be met for Packet Assembly/Disassembly facilities (PADs) located at or in association with coast earth stations in the public mobile satellite service  

X.352

Interworking between Packet-Switched Public Data Networks and public maritime mobile satellite data transmission systems  

X.353

Routing principles for interconnecting public maritime mobile satellite data transmission systems with public data networks  

X.361

Connection of VSAT systems with Packet-Switched Public Data Networks based on X.25 procedures  

X.370

[Withdrawn] Arrangements for the transfer of internetwork management information  
Deleted because it was such a general Recommendation that it served no useful practical purpose

X.371

General arrangements for interworking between Public Data Networks and the Internet  

X.400

Message handling services: Message handling system and service overview  

X.Imp400

MHS Implementors' Guide  

X.402

Information technology - Message Handling Systems (MHS): Overall architecture  

X.403

[Withdrawn] Message handling systems: conformance testing  
This Recommendation was withdrawn because conformance testing concepts and methods defined in it were related to the 1984 MHS Recommendations and were not aligned with either the first or second versions of conformance testing standards. ITU-T X.480 (1992) refers to the 1988 "Blue Book" MHS Recommendations and was better aligned with the testing standards

X.404

Information technology - Message Handling Systems (MHS): MHS routing - Guide for messaging systems managers  

X.407

[Withdrawn] Message handling systems: Abstract service definition conventions  
This Recommendation was not referenced from any Recommendation and some of its technical content was contained in ITU-T X.402 (1995)

X.408

Message handling systems: Encoded information type conversion rules  

X.410

[Withdrawn] Message handling systems: remote operations and reliable transfer server  
Withdrawn on 25.11.1988

X.411

Information technology - Message Handling Systems (MHS): Message Transfer System: Abstract Service Definition and Procedures  

X.412

Information technology - Message Handling Systems (MHS): MHS routing  

X.413

Information technology - Message Handling Systems (MHS): Message store - Abstract service definition  

X.419

Information technology - Message Handling Systems (MHS): Protocol Specifications  

X.420

Information technology - Message Handling Systems (MHS): Interpersonal Messaging System  

X.421

Message handling systems: COMFAX use of MHS  

X.435

Information technology - Message Handling Systems (MHS): Electronic data interchange messaging system  

X.440

Message handling systems: Voice messaging system  

X.445

Asynchronous protocol specification - Provision of OSI connection mode network service over the telephone network  

X.446

Common messaging call API  

X.460

Information technology - Message Handling Systems (MHS) Management: Model and architecture  

X.462

Information technology - Message Handling Systems (MHS) Management: Logging information  

X.467

Information technology - Message Handling Systems (MHS) Management: Message Transfer Agent management  

X.480

[Withdrawn] Message handling systems and directory services - conformance testing  
Withdrawn as it references documents that have been deleted by the ITU

X.481

Message handling systems - P2 protocol PICS proforma  

X.482

Message handling systems - P1 Protocol PICS proforma  

X.483

Message handling systems - P3 Protocol PICS proforma  

X.484

Message handling systems - P7 protocol PICS proforma  

X.485

Message handling systems: Voice messaging system Protocol Implementation Conformance Statement (PICS) proforma  

X.486

Message handling systems - Pedi protocol PICS proforma  

X.487

Message handling systems - IPM-MS attributes PICS proforma  

X.488

Message handling systems - EDI-MS attributes PICS proforma  

X.500

Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models and services  

X.Imp500

Directory Implementors' Guide  

X.501

Information technology - Open Systems Interconnection - The Directory: Models  

X.509

Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks  

X.510

Information Technology - Open systems Interconnection - The Directory - Protocol specifications for secure operations  

X.511

Information technology - Open Systems Interconnection - The Directory: Abstract service definition  

X.518

Information technology - Open Systems Interconnection - The Directory: Procedures for distributed operation  

X.519

Information technology - Open Systems Interconnection - The Directory: Protocol specifications  

X.520

Information technology - Open Systems Interconnection - The Directory: Selected attribute types  

X.521

Information technology - Open Systems Interconnection - The Directory: Selected object classes  

X.525

Information technology - Open Systems Interconnection - The Directory: Replication  

X.530

Information technology - Open Systems Interconnection - The Directory: Use of systems management for administration of the Directory  

X.581

[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Directory Access Protocol - Protocol Implementation Conformance Statement (PICS) proforma  

X.582

[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Directory System Protocol - Protocol Implementation Conformance Statement (PICS) proforma  

X.583

[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory Access Protocol  

X.584

[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory System Protocol  

X.585

[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory Operational Binding Management Protocol  

X.586

[Withdrawn] Information technology - Open Systems Interconnection - The Directory: Protocol Implementation Conformance Statement (PICS) Proforma for the Directory Information Shadowing Protocol  

X.590

JSON signature scheme (JSS)  

X.601

Multi-peer communications framework  

X.602

Information technology - Group management protocol  

X.603

Information technology - Relayed multicast protocol: Framework  

X.603.1

Information technology - Relayed multicast protocol: Specification for simplex group applications  

X.603.2

Information technology - Relayed multicast protocol: Specification for N-plex group applications  

X.604

Information technology - Mobile multicast communications: Framework  

X.604.1

Information technology - Mobile multicast communications: Protocol over native IP multicast networks  

X.604.2

Information technology - Mobile multicast communications: Protocol over overlay multicast networks  

X.605

Information technology - Enhanced Communications Transport Service definition  

X.606

Information technology - Enhanced Communications Transport Protocol: Specification of simplex multicast transport  

X.606.1

Information technology - Enhanced Communications Transport Protocol: Specification of QoS management for simplex multicast transport  

X.607

Information technology - Enhanced communications transport protocol: Specification of duplex multicast transport  

X.607.1

Information technology - Enhanced communications transport protocol: Specification of QoS management for duplex multicast transport  

X.608

Information technology - Enhanced communications transport protocol: Specification of N-plex multicast transport  

X.608.1

Information technology - Enhanced communications transport protocol: Specification of QoS management for n-plex multicast transport  

X.609

Managed peer-to-peer (P2P) communications: Functional architecture  

X.609.1

Managed P2P communications: Peer activity management protocol (PAMP)  

X.609.2

Managed P2P communications: Overlay resource control protocol (ORCP)  

X.609.3

Managed P2P communications: Multimedia streaming signalling requirements  

X.609.4

Managed P2P communications: Multimedia streaming peer protocol  

X.609.5

Managed P2P communications: Overlay management protocol  

X.609.6

Managed P2P communications: Content distribution signalling requirements  

X.609.7

Managed P2P communications: Content distribution peer protocol  

X.609.8

Managed P2P communications: Management protocol for live data sources  

X.609.9

Managed P2P communications: Overlay content management protocol  

X.609.10

Managed P2P communications: Signalling requirements for data streaming  

X.610

Provision and support of the OSI connection-mode Network service  

X.612

Information technology - Provision of the OSI connection-mode network service by packet-mode terminal equipment connected to an Integrated Services Digital Network (ISDN)  

X.613

Information technology - Use of X.25 Packet Layer Protocol in conjunction with X.21/X.21 bis to provide the OSI connection-mode Network service  

X.614

Information technology - Use of X.25 Packet Layer Protocol to provide the OSI connection-mode Network service over the telephone network  

X.622

Information technology - Protocol for providing the connectionless-mode Network service: Provision of the underlying service by an X.25 Subnetwork  

X.623

Information technology - Protocol for providing the connectionless-mode Network service: Provision of the underlying service by a subnetwork that provides the OSI Data Link service  

X.625

Information technology - Protocol for providing the connectionless-mode Network service: Provision of the underlying service by ISDN circuit-switched B-channels  

X.630

Efficient Open Systems Interconnection (OSI) operations  

X.633

Information technology - Open Systems Interconnection - Network Fast Byte Protocol  

X.634

Information technology - Open Systems Interconnection - Transport Fast Byte Protocol  

X.637

Basic connection-oriented common upper layer requirements  

X.638

Minimal OSI facilities to support basic communications applications  

X.639

Basic connection-oriented requirements for ROSE-based profiles  

X.641

Information technology - Quality of service: framework  

X.642

Information technology - Quality of service - Guide to methods and mechanisms  

X.650

Information technology - Open Systems Interconnection - Basic Reference Model: Naming and addressing  

X.660

Information technology - Procedures for the operation of object identifier registration authorities: General procedures and top arcs of the international object identifier tree  

X.662

Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Registration of object identifier arcs beneath the top-level arc jointly administered by ISO and ITU-T  

X.665

Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Registration of application processes and application entities  

X.666

Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Joint ISO and ITU-T registration of international organizations  

X.667

Information technology - Procedures for the operation of object identifier registration authorities: Generation of universally unique identifiers and their use in object identifiers  

X.668

Information technology - Open Systems Interconnection - Procedures for the operation of OSI Registration Authorities: Registration of object identifier arcs for applications and services using tag-based identification  

X.669

Procedures for ITU-T registration of identified organizations  

X.670

Use of registration agents to register names subordinate to country names in the X.660 RH-name-tree  

X.671

Procedures for a Registration Authority operating on behalf of countries to register organization names subordinate to country names in the X.660 RH-name-tree  

X.672

Information technology - Open systems interconnection - Object identifier resolution system  

X.674

Procedures for the registration of arcs under the Alerting object identifier arc  

X.675

OID-based resolution framework for heterogeneous identifiers and locators  

X.676

Object identifier-based resolution framework for IoT grouped services  

X.677

Identification mechanism for unmanned aerial vehicles using object identifiers  

X.680

Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation  

X.681

Information technology - Abstract Syntax Notation One (ASN.1): Information object specification  

X.682

Information technology - Abstract Syntax Notation One (ASN.1): Constraint specification  

X.683

Information technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications  

X.690

Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)  

X.691

Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER)  

X.692

Information technology - ASN.1 encoding rules: Specification of Encoding Control Notation (ECN)  

X.693

Information technology - ASN.1 encoding rules: XML Encoding Rules (XER)  

X.694

Information technology - ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1  

X.695

Information technology - ASN.1 encoding rules: Registration and application of PER encoding instructions  

X.696

Information technology - ASN.1 encoding rules: Specification of Octet Encoding Rules (OER)  

X.697

Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER)  

X.700

Management framework for Open Systems Interconnection (OSI) for CCITT applications  

X.Imp700

X.700-Series - OSI Systems Management Implementors' Guide  

X.701

Information technology - Open Systems Interconnection - Systems management overview  

X.702

Information technology - Open Systems Interconnection - Application context for systems management with transaction processing  

X.703

Information technology - Open Distributed Management Architecture  

X.710

Information technology - Open Systems Interconnection - Common Management Information service  

X.711

Information technology - Open Systems Interconnection - Common Management Information Protocol: Specification  

X.712

Information technology - Open Systems Interconnection - Common management information protocol: Protocol Implementation Conformance Statement (PICS) proforma  

X.720

Information technology - Open Systems Interconnection - Structure of management information: Management information model  

X.721

Information technology - Open Systems Interconnection - Structure of management information: Definition of management information  

X.722

Information technology - Open Systems Interconnection - Structure of management information: Guidelines for the definition of managed objects  

X.723

Information technology - Open Systems Interconnection - Structure of management information: Generic management information  

X.724

Information technology - Open Systems Interconnection - Structure of management information: Requirements and guidelines for implementation conformance statement proformas associated with OSI management  

X.725

Information technology - Open Systems Interconnection - Structure of management information: General Relationship Model  

X.727

Information technology - Open Systems Interconnection - Structure of management information: Systems management application layer managed objects  

X.730

Information technology - Open Systems Interconnection - Systems Management: Object management function  

X.731

Information technology - Open Systems Interconnection - Systems management: State management function  

X.732

Information technology - Open Systems Interconnection - Systems Management: Attributes for representing relationships  

X.733

Information technology - Open Systems Interconnection - Systems Management: Alarm reporting function  

X.734

Information technology - Open Systems Interconnection - Systems Management: Event report management function  

X.735

Information technology - Open Systems Interconnection - Systems Management: Log control function  

X.736

Information technology - Open Systems Interconnection - Systems Management: Security alarm reporting function  

X.737

Information technology - Open Systems Interconnection - Systems Management: Confidence and diagnostic test categories  

X.738

Information technology - Open Systems Interconnection - Systems management: Summarization function  

X.739

Information technology - Open Systems Interconnection - Systems Management: Metric objects and attributes  

X.740

Information technology - Open Systems Interconnection - Systems Management: Security audit trail function  

X.741

Information technology - Open Systems Interconnection - Systems management: Objects and attributes for access control  

X.742

Information technology - Open Systems Interconnection - Systems management: Usage metering function for accounting purposes  

X.743

Information technology - Open Systems Interconnection - Systems Management: Time Management Function  

X.744

Information technology - Open Systems Interconnection - Systems Management: Software management function  

X.744.1

CORBA-based TMN software management service  

X.745

Information technology - Open Systems Interconnection - Systems Management: Test management function  

X.746

Information technology - Open Systems Interconnection - Systems Management: Scheduling function  

X.748

Information technology - Open Systems Interconnection - Systems Management: Response Time Monitoring Function  

X.749

Information technology - Open Systems Interconnection - Systems Management: Management domain and management policy management function  

X.750

Information technology - Open Systems Interconnection - Systems Management: Management knowledge management function  

X.751

Information technology - Open Systems Interconnection - Systems Management: Changeover function  

X.753

Information technology - Open Systems Interconnection - Systems management: Command Sequencer for Systems Management  

X.754

Enhanced Event Control Function  

X.760

The measurement framework for the statistical indicators of website traffic  

X.770

ODMA notification dispatch function  

X.780

TMN guidelines for defining CORBA managed objects  

X.780.1

TMN guidelines for defining coarse-grained CORBA managed object interfaces  

X.780.2

TMN guidelines for defining service-oriented CORBA managed objects and façade objects  

X.781

Requirements and guidelines for Implementation Conformance Statements proformas associated with CORBA-based systems  

X.782

Guidelines for defining web services for managed objects and management interfaces  

X.783

Guidelines for implementation conformance statement proformas associated with web services-based management systems  

X.784

Guidelines for implementation conformance statements proformas associated with SNMP-based management systems  

X.785

Guidelines for defining REST-based managed objects and management interfaces  

X.786

Guidelines for implementation conformance statement proformas associated with REST-based management systems  

X.790

Trouble management function for ITU-T applications  

X.791

Profile for trouble management function for ITU-T applications  

X.792

Configuration audit support function for ITU-T applications  

X.800

Security architecture for Open Systems Interconnection for CCITT applications  

X.802

Information technology - Lower layers security model  

X.803

Information technology - Open Systems Interconnection - Upper layers security model  

X.805

Security architecture for systems providing end-to-end communications  

X.810

Information technology - Open Systems Interconnection - Security frameworks for open systems: Overview  

X.811

Information technology - Open Systems Interconnection - Security frameworks for open systems: Authentication framework  

X.812

Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework  

X.813

Information technology - Open Systems Interconnection - Security frameworks for open systems: Non-repudiation framework  

X.814

Information technology - Open Systems Interconnection - Security frameworks for open systems: Confidentiality framework  

X.815

Information technology - Open Systems Interconnection - Security frameworks for open systems: Integrity framework  

X.816

Information technology - Open Systems Interconnection - Security frameworks for open systems: Security audit and alarms framework  

X.830

Information technology - Open Systems Interconnection - Generic upper layers security: Overview, models and notation  

X.831

Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element (SESE) service definition  

X.832

Information technology - Open Systems Interconnection - Generic upper layers security: Security Exchange Service Element (SESE) protocol specification  

X.833

Information technology - Open Systems Interconnection - Generic upper layers security: Protecting transfer syntax specification  

X.834

Information technology - Open Systems Interconnection - Generic Upper Layers Security: Security Exchange Service Element (SESE) Protocol Implementation Conformance Statement (PICS) proforma  

X.835

Information technology - Open Systems Interconnection - Generic Upper Layers Security: Protecting transfer syntax Protocol Implementation Conformance Statement (PICS) proforma  

X.841

Information technology - Security techniques - Security information objects for access control  

X.842

Information technology - Security techniques - Guidelines for the use and management of trusted third party services  

X.843

Information technology - Security techniques - Specification of TTP services to support the application of digital signatures  

X.851

Information technology - Open Systems Interconnection - Service definition for the Commitment, Concurrency and Recovery service element  

X.852

Information technology - Open Systems Interconnection - Protocol for the Commitment, Concurrency and Recovery service element: Protocol specification  

X.853

Information technology - Open Systems Interconnection - Protocol for the Commitment, Concurrency and Recovery service element: Protocol Implementation Conformance Statement (PICS) proforma  

X.860

Open Systems Interconnection - Distributed Transaction Processing: Model  

X.861

Open Systems Interconnection - Distributed Transaction Processing: Service definition  

X.862

Open Systems Interconnection - Distributed Transaction Processing: Protocol specification  

X.863

Information technology - Open Systems Interconnection - Distributed Transaction Processing: Protocol Implementation Conformance Statement (PICS) proforma  

X.880

Information technology - Remote Operations: Concepts, model and notation  

X.881

Information technology - Remote Operations: OSI realizations - Remote Operations Service Element (ROSE) service definition  

X.882

Information technology - Remote Operations: OSI realizations - Remote Operations Service Element (ROSE) protocol specification  

X.891

Information technology - Generic applications of ASN.1: Fast infoset  

X.892

Information technology - Generic applications of ASN.1: Fast Web Services  

X.893

Information technology - Generic applications of ASN.1: Fast infoset security  

X.894

Information technology - Generic applications of ASN.1: Cryptographic message syntax  

X.901

Information technology - Open Distributed Processing - Reference Model: Overview  

X.902

Information technology - Open Distributed Processing - Reference model: Foundations  

X.903

Information technology - Open Distributed Processing - Reference model: Architecture  

X.904

Information technology - Open Distributed Processing - Reference Model: Architectural Semantics  

X.906

Information technology - Open distributed processing - Use of UML for ODP system specifications  

X.910

Information technology - Open Distributed Processing - Naming framework  

X.911

Information technology - Open distributed processing - Reference model - Enterprise language  

X.920

Information technology - Open Distributed Processing - Interface Definition Language  

X.930

Information technology - Open Distributed Processing - Interface references and binding  

X.931

Information technology - Open Distributed Processing - Protocol support for computational interactions  

X.950

Information technology - Open Distributed Processing - Trading Function: Specification  

X.952

Information technology - Open Distributed Processing - Trading function: Provision of trading function using OSI Directory service  

X.960

Information technology - Open Distributed Processing - Type repository function  

X.1011

Guidelines for continuous protection of the service access process  

X.1031

Roles of end users and telecommunications networks within security architecture  

X.1032

Architecture of external interrelationships for a telecommunication IP-based network security system  

X.1033

Guidelines on security of individual information services provided by operators  

X.1034

Guidelines on extensible authentication protocol based authentication and key management in a data communication network  

X.1035

Password-authenticated key exchange (PAK) protocol  

X.1036

Framework for creation, storage, distribution and enforcement of policies for network security  

X.1037

IPv6 technical security guidelines  

X.1038

Security requirements and reference architecture for software-defined networking  

X.1039

Technical security measures for implementation of ITU-T X.805 security dimensions  

X.1040

Security reference architecture for lifecycle management of e-commerce business data  

X.1041

Security framework for voice-over-long-term-evolution (VoLTE) network operation  

X.1042

Security services using software-defined networking  

X.1043

Security framework and requirements for service function chaining based on software-defined networking  

X.1044

Security requirements of network virtualization  

X.1045

Security service chain architecture for networks and applications  

X.1046

Framework of software-defined security in software-defined networks/network functions virtualization networks  

X.1047

Security requirements and architecture for network slice management and orchestration  

X.1051

Information security, cybersecurity and privacy protection - Information security controls based on ISO/IEC 27002 for telecommunications organizations  

X.1052

Information security management processes for telecommunication organizations  

X.1053

Code of practice for information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations  

X.1054

Information security, cybersecurity and privacy protection - Governance of information security  

X.1055

Risk management and risk profile guidelines for telecommunication organizations  

X.1056

Security incident management guidelines for telecommunications organizations  

X.1057

Asset management guidelines in telecommunication organizations  

X.1058

Information technology - Security techniques - Code of practice for personally identifiable information protection  

X.1059

Implementation guidance for telecommunication organizations on risk management of their assets globally accessible in IP-based networks  

X.1060

Framework for the creation and operation of a cyber defence centre  

X.1061

Cyber insurance acquisition guidelines  

X.1080.0

Access control for telebiometrics data protection  

X.1080.1

e-Health and world-wide telemedicines - Generic telecommunication protocol  

X.1080.2

Biology-to-machine (B2M) protocol  

X.1081

The telebiometric multimodal model - A framework for the specification of security and safety aspects of telebiometrics  

X.1082

Telebiometrics related to human physiology  

X.1083

Information technology - Biometrics - BioAPI interworking protocol  

X.1084

Telebiometrics system mechanism - Part 1: General biometric authentication protocol and system model profiles for telecommunications systems  

X.1085

Information technology - Security techniques - Telebiometric authentication framework using biometric hardware security module  

X.1086

Telebiometrics protection procedures - Part 1: A guideline to technical and managerial countermeasures for biometric data security  

X.1087

Technical and operational countermeasures for telebiometric applications using mobile devices  

X.1088

Telebiometrics digital key framework (TDK) - A framework for biometric digital key generation and protection  

X.1089

Telebiometrics authentication infrastructure (TAI)  

X.1090

Authentication framework with one-time telebiometric templates  

X.1091

A guideline for evaluating telebiometric template protection techniques  

X.1092

Integrated framework for telebiometric data protection in e-health and telemedicine  

X.1093

Telebiometric access control with smart ID cards  

X.1094

Telebiometric authentication using biosignals  

X.1095

Entity authentication service for pet animals using telebiometrics  

X.1101

Security requirements and framework for multicast communication  

X.1111

Framework of security technologies for home network  

X.1112

Device certificate profile for the home network  

X.1113

Guideline on user authentication mechanisms for home network services  

X.1114

Authorization framework for home networks  

X.1121

Framework of security technologies for mobile end-to-end data communications  

X.1122

Guideline for implementing secure mobile systems based on PKI  

X.1123

Differentiated security service for secure mobile end-to-end data communication  

X.1124

Authentication architecture for mobile end-to-end data communication  

X.1125

Correlative Reacting System in mobile data communication  

X.1126

Guidelines on mitigating the negative effects of infected terminals in mobile networks  

X.1127

Functional security requirements and architecture for mobile phone anti-theft measures  

X.1141

Security Assertion Markup Language (SAML 2.0)  

X.1142

eXtensible Access Control Markup Language (XACML 2.0)  

X.1143

Security architecture for message security in mobile web services  

X.1144

eXtensible Access Control Markup Language (XACML) 3.0  

X.1145

Security framework and requirements for open capabilities of telecommunication services  

X.1146

Secure protection guidelines for value-added services provided by telecommunication operators  

X.1147

Security requirements and framework for big data analytics in mobile Internet services  

X.1148

Framework of de-identification process for telecommunication service providers  

X.1149

Security framework of an open platform for FinTech services  

X.1151

Guideline on secure password-based authentication protocol with key exchange  

X.1152

Secure end-to-end data communication techniques using trusted third party services  

X.1153

Management framework of a one time password-based authentication service  

X.1154

General framework of combined authentication on multiple identity service provider environments  

X.1155

Guidelines on local linkable anonymous authentication for electronic services  

X.1156

Non-repudiation framework based on a one-time password  

X.1157

Technical capabilities of fraud detection and response for services with high assurance level requirements  

X.1158

Multi-factor authentication mechanisms using a mobile device  

X.1159

Delegated non-repudiation architecture based on ITU-T X.813  

X.1161

Framework for secure peer-to-peer communications  

X.1162

Security architecture and operations for peer-to-peer networks  

X.1163

Security requirements and mechanisms of peer-to-peer-based telecommunication networks  

X.1164

Use of service providers' user authentication infrastructure to implement public key infrastructure for peer-to-peer networks  

X.1171

Threats and requirements for protection of personally identifiable information in applications using tag-based identification  

X.1191

Functional requirements and architecture for IPTV security aspects  

X.1192

Functional requirements and mechanisms for the secure transcodable scheme of IPTV  

X.1193

Key management framework for secure internet protocol television (IPTV) services  

X.1194

Algorithm selection scheme for service and content protection descrambling  

X.1195

Service and content protection interoperability scheme  

X.1196

Framework for the downloadable service and content protection system in the mobile Internet Protocol television environment  

X.1197

Guidelines on criteria for selecting cryptographic algorithms for IPTV service and content protection  

X.1198

Virtual machine-based security platform for renewable IPTV service and content protection  

X.1205

Overview of cybersecurity  

X.1206

A vendor-neutral framework for automatic notification of security related information and dissemination of updates  

X.1207

Guidelines for telecommunication service providers for addressing the risk of spyware and potentially unwanted software  

X.1208

A cybersecurity indicator of risk to enhance confidence and security in the use of telecommunication/information and communication technologies  

X.1209

Capabilities and their context scenarios for cybersecurity information sharing and exchange  

X.1210

Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks  

X.1211

Techniques for preventing web-based attacks  

X.1212

Design considerations for improved end-user perception of trustworthiness indicators  

X.1213

Security capability requirements for countering smartphone-based botnets  

X.1214

Security assessment techniques in telecommunication/information and communication technology networks  

X.1215

Use cases for structured threat information expression  

X.1216

Requirements for collection and preservation of cybersecurity incident evidence  

X.1217

Guidelines for applying threat intelligence in telecommunication network operation  

X.1218

Requirements and guidelines for dynamic malware analysis in a sandbox environment  

X.1219

Functional requirements for a secured process to evaluate technical vulnerabilities  

X.1220

Security framework for storage protection against malware attacks on hosts  

X.1231

Technical strategies for countering spam  

X.1232

Technical framework for countering advertising spam in user-generated information  

X.1233

Guidelines for countering spam over instant messaging  

X.1234

Guidelines for countering multimedia messaging service spam  

X.1235

Technologies in countering website spoofing for telecommunication organizations  

X.1236

Security requirements and countermeasures for targeted email attacks  

X.1240

Technologies involved in countering e-mail spam  

X.1241

Technical framework for countering email spam  

X.1242

Short message service (SMS) spam filtering system based on user-specified rules  

X.1243

Interactive gateway system for countering spam  

X.1244

Overall aspects of countering spam in IP-based multimedia applications  

X.1245

Framework for countering spam in IP-based multimedia applications  

X.1246

Technologies involved in countering voice spam in telecommunication organizations  

X.1247

Technical framework for countering mobile messaging spam  

X.1248

Technical requirements for countering instant messaging spam  

X.1249

Technical framework for countering mobile in-application advertising spam  

X.1250

Baseline capabilities for enhanced global identity management and interoperability  

X.1251

A framework for user control of digital identity  

X.1252

Baseline identity management terms and definitions  

X.1253

Security guidelines for identity management systems  

X.1254

Entity authentication assurance framework  

X.1255

Framework for discovery of identity management information  

X.1256

Guidelines and framework for sharing network authentication results with service applications  

X.1257

Identity and access management taxonomy  

X.1258

Enhanced entity authentication based on aggregated attributes  

X.1261

Policy framework including principles for digital identity infrastructure  

X.1275

Guidelines on protection of personally identifiable information in the application of RFID technology  

X.1276

Authentication step-up protocol and metadata Version 1.0  

X.1277

Universal authentication framework  

X.1277.2

Universal authentication framework protocol specification  

X.1278

Client to authenticator protocol/Universal 2-factor framework  

X.1278.2

Client to authenticator protocol  

X.1279

Framework of enhanced authentication using telebiometrics with anti-spoofing detection mechanisms  

X.1282

Security measures for countering password-related online attacks  

X.1303

Common alerting protocol (CAP 1.1)  

X.1303bis

Common alerting protocol (CAP 1.2)  

X.1311

Information technology - Security framework for ubiquitous sensor networks  

X.1312

Ubiquitous sensor network middleware security guidelines  

X.1313

Security requirements for wireless sensor network routing  

X.1314

Security requirements and framework of ubiquitous networking  

X.1331

Security guidelines for home area network (HAN) devices in smart grid systems  

X.1332

Security guidelines for smart metering services in smart grids  

X.1333

Security guidelines for use of remote access tools in Internet-connected control systems  

X.1341

Certified mail transport and certified post office protocols  

X.1352

Security requirements for Internet of things devices and gateways  

X.1361

Security framework for the Internet of things based on the gateway model  

X.1362

Simple encryption procedure for Internet of things (IoT) environments  

X.1363

Technical framework of personally identifiable information handling system in Internet of things environment  

X.1364

Security requirements and framework for narrowband Internet of things  

X.1365

Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks  

X.1366

Aggregate message authentication schemes for Internet of things environment  

X.1367

Standard format for Internet of things error logs for security incident operations  

X.1368

Secure firmware or software update for Internet of things devices  

X.1369

Security requirements for IoT service platform  

X.1371

Security threats to connected vehicles  

X.1372

Security guidelines for vehicle-to-everything (V2X) communication  

X.1373

Secure software update capability for intelligent transportation system communication devices  

X.1374

Security requirements for external interfaces and devices with vehicle access capability  

X.1375

Guidelines for an intrusion detection system for in-vehicle networks  

X.1376

Security-related misbehaviour detection mechanism using big data for connected vehicles  

X.1377

Guidelines for an intrusion prevention system for connected vehicles  

X.1379

Security requirements for roadside units in intelligent transportation systems  

X.1380

Security guidelines for cloud-based event data recorders in automotive environments  

X.1381

Security guidelines for Ethernet-based in-vehicle networks  

X.1382

Guidelines for sharing security threat information on connected vehicles  

X.1383

Security requirements for categorized data in vehicle-to-everything (V2X) communication  

X.1400

Terms and definitions for distributed ledger technology  

X.1401

Security threats of distributed ledger technology  

X.1402

Security framework for distributed ledger technology  

X.1403

Security guidelines for using distributed ledger technology for decentralized identity management  

X.1404

Security assurance for distributed ledger technology  

X.1405

Security threats and requirements for digital payment services based on distributed ledger technology  

X.1406

Security threats to online voting systems using distributed ledger technology  

X.1407

Security requirements for digital integrity proofing service based on distributed ledger technology  

X.1408

Security threats and requirements for data access and sharing based on the distributed ledger technology  

X.1409

Security services based on distributed ledger technology  

X.1410

Security architecture of data sharing management based on the distributed ledger technology  

X.1411

Guideline on blockchain as a service (BaaS) security  

X.1412

Security requirements for smart contract management based on the distributed ledger technology  

X.1450

Guidelines on hybrid authentication and key management mechanisms in the client-server model  

X.1451

Risk identification to optimize authentication  

X.1452

Guidelines for security services provided by operators  

X.1453

Security threats and requirements for video management systems  

X.1454

Security measures for location-enabled smart office services  

X.1470

Security guidelines of web-based online customer service  

X.1500

Overview of cybersecurity information exchange  

X.1500.1

Procedures for the registration of arcs under the object identifier arc for cybersecurity information exchange  

X.1520

Common vulnerabilities and exposures  

X.1521

Common vulnerability scoring system  

X.1524

Common weakness enumeration  

X.1525

Common weakness scoring system  

X.1526

Language for the open definition of vulnerabilities and for the assessment of a system state  

X.1528

Common platform enumeration  

X.1528.1

Common platform enumeration naming  

X.1528.2

Common platform enumeration name matching  

X.1528.3

Common platform enumeration dictionary  

X.1528.4

Common platform enumeration applicability language  

X.1541

Incident object description exchange format version 2  

X.1542

Session information message exchange format  

X.1544

Common attack pattern enumeration and classification  

X.1546

Malware attribute enumeration and characterization  

X.1550

Access control models for incident exchange networks  

X.1570

Discovery mechanisms in the exchange of cybersecurity information  

X.1580

Real-time inter-network defence  

X.1581

Transport of real-time inter-network defence messages  

X.1582

Transport protocols supporting cybersecurity information exchange  

X.1601

Security framework for cloud computing  

X.1602

Security requirements for software as a service application environments  

X.1603

Data security requirements for the monitoring service of cloud computing  

X.1604

Security requirements of Network as a Service (NaaS) in cloud computing  

X.1605

Security requirements of public Infrastructure as a Service (IaaS) in cloud computing  

X.1606

Security requirements for communications as a service application environments  

X.1631

Information technology - Security techniques - Code of practice for information security controls based on ISO/IEC 27002 for cloud services  

X.1641

Guidelines for cloud service customer data security  

X.1642

Guidelines for the operational security of cloud computing  

X.1643

Security requirements and guidelines for virtualization containers in cloud computing environments  

X.1644

Security guidelines for distributed cloud  

X.1645

Requirements of network security situational awareness platform for cloud computing  

X.1702

Quantum noise random number generator architecture  

X.1710

Security framework for quantum key distribution networks  

X.1712

Security requirements and measures for quantum key distribution networks - key management  

X.1714

Key combination and confidential key supply for quantum key distribution networks  

X.1715

Security requirements and measures for integration of quantum key distribution network and secure storage network  

X.1750

Guidelines on security of big data as a service for big data service providers  

X.1751

Security guidelines for big data lifecycle management by telecommunication operators  

X.1752

Security guidelines for big data infrastructure and platform  

X.1770

Technical guidelines for secure multi-party computation  

X.1811

Security guidelines for applying quantum-safe algorithms in IMT-2020 systems  

X.1812

Security framework based on trust relationships for the IMT-2020 ecosystem  

X.1813

Security and monitoring requirements for operation of vertical services supporting ultra-reliability and low latency communication (URLLC) in IMT-2020 private networks  

X.1814

Security guidelines for IMT-2020 communication system s  

X.1815

Security guidelines and requirements for IMT-2020 edge computing services  

X.1816

Guidelines and requirements for classifying security capabilities in IMT-2020 network slice  

X.1817

Security requirements for 5G messaging service  

X.ImpOSI

OSI Implementers' Guide - Version 1.1  

X.Sup1

ITU-T X.135 - Supplement related to some test results from specific national and international portions  

X.Sup2

ITU-T X.800-X.849 series - Supplement on security baseline for network operators  

X.Sup3

ITU-T X.800-X.849 series - Supplement on guidelines for implementing system and network security  

X.Sup4

ITU-T X.290-series - Supplement on generic approach to interoperability testing  

X.Sup5

ITU-T X.290 series - Supplement on interoperability testing framework and methodology  

X.Sup6

ITU-T X.1240 series - Supplement on countering spam and associated threats  

X.Sup7

ITU-T X.1250 series - Supplement on overview of identity management in the context of cybersecurity  

X.Sup8

ITU-T X.1205 - Supplement on best practices against botnet threats  

X.Sup9

ITU-T X.1205 - Supplement on guidelines for reducing malware in ICT networks  

X.Sup10

ITU-T X.1205 - Supplement on usability of network traceback  

X.Sup11

ITU-T X.1245 - Supplement on framework based on real-time blocking lists for countering VoIP spam  

X.Sup12

ITU-T X.1240 - Supplement on overall aspects of countering mobile messaging spam  

X.Sup13

ITU-T X.1051 - Supplement on information security management users' guide for Recommendation ITU-T X.1051  

X.Sup14

ITU-T X.1243 - Supplement on a practical reference model for countering e-mail spam using botnet information  

X.Sup15

ITU-T X.800-X.849 series - Supplement on guidance for creating a national IP-based public network security centre for developing countries  

X.Sup16

ITU-T X.800-X.849 series - Supplement on architectural systems for security controls for preventing fraudulent activities in public carrier networks  

X.Sup17

ITU-T X.1143 - Supplement on threats and security objectives for enhanced web-based telecommunication services  

X.Sup18

ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based telecommunication networks  

X.Sup19

ITU-T X.1120-X.1139 series - Supplement on security aspects of smartphones  

X.Sup20

ITU-T X.1205 - Supplement on framework of security information sharing negotiation  

X.Sup21

ITU-T X.1143 - Supplement on security framework for web mashup services  

X.Sup22

ITU-T X.1144 - Supplement on enhancements and new features in eXtensible Access Control Markup Language (XACML 3.0)  

X.Sup23

ITU-T X.1037 - Supplement on security management guidelines for the implementation of an IPv6 environment in telecommunication organizations  

X.Sup24

ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices  

X.Sup25

ITU-T X.1231 - Supplement on guidance to assist in countering spam for mobile phone developers  

X.Sup26

ITU-T X.1111 - Supplement on security functional architecture for smart grid services using telecommunication networks  

X.Sup27

ITU-T X.1054 - Supplement on best practice for governance of information security - Case of Burkina Faso  

X.Sup28

ITU-T X.1245 - Supplement on technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE)  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup29

ITU-T X.1242 - Supplement on guidelines on countermeasures against short message service phishing and smishing attacks  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup30

ITU-T X.805 - Supplement on security guidelines for mobile virtual network operators  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup31

ITU-T X.660 - Supplement on guidelines for using object identifiers for the Internet of things  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup32

ITU-T X.1058 - Supplement on code of practice for personally identifiable information (PII) protection for telecommunication organizations  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup33

ITU-T X.1231 - Supplement on technical framework for countering telephone service scams  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup34

ITU-T X.1051 - Supplement on code of practice for information security controls for telecommunication organizations  
This Supplement was replaced on 03/05/2019 to reflect and updated title

X.Sup35

ITU-T X.1254 - Supplement on use cases of entity authentication assurance (EAA) framework  

X.Sup36

ITU-T X.1051 - Supplement on critical security controls for information and network security management by telecommunication organizations  

X.Sup37

ITU-T X.1231 - Supplement on countering spam based on machine learning  

X.Sup38

ITU-T X.1152 - Supplement on use cases for contact tracing technologies to prevent spread of infectious diseases  

X.Sup39

ITU-T X.1148 - Supplement on requirements for data de-identification assurance  

 

Top -  Feedback -  Contact us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  ITU-T Publications
Updated : 2024-02-13