| 
    
            
                
                    | 
                            
                                | لغة ترميز التحكم في النفاذ القابلة للتوسعة (XACML) 3,1 |  
                                | تضع التوصية ITU-T X.1144 (2013) لغة ترميز التحكم في النفاذ القابلة للتوسيع (XACML 3.0) وهي صيغة محدثة للتوصية ITU-T X.1142 (المكافئة للمعيار OASIS XACML 2.0 (2006/06)).تحدد التوصية ITU-T X.1144 (2024) اللغة XACML المركزية بما فيها قواعد هذه اللغة ونماذجها والسياق مع نموذج لغة السياسة وقواعد التركيب والمعالجة. وتكافئ هذه التوصية من الناحية التقنية المعيار OASIS XACML 3.1 وتتواءم معه. |  |  
                    | 
 
                            
                                | Citation: | https://handle.itu.int/11.1002/1000/15877 |  
                                | Series title: | X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I)
 X.1140-X.1149: Web security (I)
 |  
                                | Approval date: | 2024-04-29 |  | Provisional name: | X.xacml3 |  | Approval process: | AAP |  
                                | Status: | In force |  
                                | Maintenance responsibility: | ITU-T Study Group 17 |  
                                | Further details: | Patent statement(s) Development history
 
 |  |  
    
    
    
 | 
		
			| 
				
					
						
                                    
    
        
            |  |  
							| ITU-T Supplement | Title | Status | Summary | Table of contents | Download |  
                    | X Suppl. 22 (01/2014) | ITU-T X.1144 - Supplement on enhancements and new features in eXtensible Access Control Markup Language (XACML 3.0) | In force | 
					here | 
					here | here |  
    
    
    
 
						
                                    
    
    
        
            | Title | Approved on | Download |  
                    | Guidelines for identity-based cryptosystems used for cross-domain secure communications | 2023 | here |  
                    | Overview of hybrid approaches for key exchange with quantum key distribution | 2022 | here |  
                    | Guidelines for security management of using artificial intelligence technology | 2022 | here |  
                    | Successful use of security standards (2nd edition) | 2020 | here |  
                    | Description of the incubation mechanism and ways to improve it | 2020 | here |  
                    | Strategic approaches to the transformation of security studies | 2020 | here |  
    
    
 |