Information technology – Message Handling Systems (MHS): Protocol Specifications |
 |
This Recommendation | International Standard contains new additional optional application contexts for the new versions of P3 and P7 introduced in Recommendations X.411 and X.413. The P1 conformance requirement has been revised to achieve common text with ISO/IEC. The ASN.1 has been fully revised to use the new Recommendations X.680 and X.880, while retaining complete compatibility with the 1988 and 1992 P1 and P3 protocols. This Recommendation | International Standard incorporates an enhancement on use of ISO/IEC 10646 characters in OR-addresses and numerous defect corrections. |
|
Citation: |
https://handle.itu.int/11.1002/1000/4855 |
Series title: |
X series: Data networks, open system communications and security X.400-X.499: Message Handling Systems |
Approval date: |
1999-06-18 |
Identical standard: | ISO/IEC 10021-6:2003 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
Title |
Approved on |
Download |
MHS Implementers' Guide (Version 14, March 2000)
|
2000-03-01
|
here
|
MHS Implementers' Guide (Version 13, July 1995)
|
1995-07-01
|
here
|
MHS Implementers' Guide (Version 8, March 1992)
|
1992-03-01
|
here
|
X.419 (1999-06)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|