Information technology – Generic applications of ASN.1: Fast infoset |
 |
This Recommendation | International Standard specifies a representation of an instance of the W3C XML Information Set using binary encodings. These binary encodings are specified using the ASN.1 notation and the ASN.1 Encoding Control Notation (ECN).The technology specified in this Recommendation | International Standard is named Fast Infoset. It provides an alternative to W3C XML syntax as a means of representing instances of the W3C XML Information Set. This representation generally provides smaller encoding sizes and faster processing than a W3C XML representation. This Recommendation | International Standard specifies the use of several techniques that minimize the size of the encodings (called fast infoset documents) and that maximize the speed of creating and processing fast infoset documents. These techniques include the use of dynamic tables (for both character strings and qualified names), initial vocabularies, and external vocabularies.This Recommendation | International Standard also specifies a Multipurpose Internet Mail Extensions (MIME) media type that identifies a fast infoset document. |
|
Citation: |
https://handle.itu.int/11.1002/1000/8491 |
Series title: |
X series: Data networks, open system communications and security X.850-X.899: OSI applications X.890-X.899: Generic applications of ASN.1 |
Approval date: |
2005-05-14 |
Identical standard: | ISO/IEC 24824-1:2007 (Common) |
Provisional name: | X.finf |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
X.891 (2005-05)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|