Information technology – Message Handling Systems (MHS): Electronic data interchange messaging system |
 |
This Recommendation | International Standard defines the message handling application called EDI messaging (EDIMG), a form of message handling tailored for the exchange of electronic data interchange (EDI) information. It is designed to meet the requirements of users of ISO 9735 (EDIFACT), and other commonly used EDI systems. This edition of the EDI Specification, Version 2, replaces CCITT Rec. X.435 (1991) | ISO/IEC 10021-9:1995. It consolidates Amendment 1 (Compression Extension), Amendment 2 (EDI Message Store Logs and Correlation Attributes), replacement of ASN.1:1988 with ASN.1:1994, and a revised EDI auto-forward auto-action. |
|
Citation: |
https://handle.itu.int/11.1002/1000/4694 |
Series title: |
X series: Data networks, open system communications and security X.400-X.499: Message Handling Systems |
Approval date: |
1999-06-18 |
Identical standard: | ISO/IEC 10021-9:1999 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
Title |
Approved on |
Download |
MHS Implementers' Guide (Version 14, March 2000)
|
2000-03-01
|
here
|
MHS Implementers' Guide (Version 13, July 1995)
|
1995-07-01
|
here
|
MHS Implementers' Guide (Version 8, March 1992)
|
1992-03-01
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|