| Association control protocol specification for Open Systems Interconnection for CCITT applications | 
                                  | 
                             
                            
                                
                             
                         
                     | 
                 
                
                    
                        
 
                            
                                | Citation: | 
                                https://handle.itu.int/11.1002/1000/2858 | 
                             
                            
                                | Series title: | 
                                X series: Data networks, open system communications and security   X.200-X.299: Open Systems Interconnection   X.220-X.229: Connection-mode protocol specifications | 
                             
                            
                                | Approval date: | 
                                1988-11-25 | 
                             
                            | Identical standard: | ISO  8650:1989 (Twinned) |  
                            
                            | Approval process: | WTSA |  
                            
                                | 
                                    Status: | 
                                
                                    Superseded | 
                             
                            
                            
                                | 
                                    Maintenance responsibility: | 
                                
                                    ITU-T Study Group 17 | 
                             
                            
                            
                                | 
                                    Further details: | 
                                
                                    Patent statement(s) 
                                    
                                    
                                    
                                 | 
                             
                         
                     | 
                 
             
        
    
 
    
    
    
 
                     | 
		
		
			
                        
				
					
						
                                    
    
    
        
            | Title | 
            Approved on | 
            Download | 
         
        
                
                    | 
                        OSI Implementers’ Guide - Version 1.1
                     | 
                    
                        2006-12-16
                     | 
                    
                        here
                     | 
                 
            
     
    
 
    
    
 
                                
					 
						
                                    
    
    
        
            | Title | 
            Approved on | 
            Download | 
         
        
                
                    | 
                        Guidelines for identity-based cryptosystems used for cross-domain secure communications
                     | 
                    
                        2023
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Overview of hybrid approaches for key exchange with quantum key distribution
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Guidelines for security management of using artificial intelligence technology
                     | 
                    
                        2022
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Successful use of security standards (2nd edition)
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Description of the incubation mechanism and ways to improve it
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        Strategic approaches to the transformation of security studies
                     | 
                    
                        2020
                     | 
                    
                        here
                     | 
                 
            
                
                    | 
                        ISDN field trial guidelines
                     | 
                    
                        1991
                     | 
                    
                        here
                     | 
                 
            
     
    
 
    
    
 
                                
					 
				 
			 
                     |