| OSI conformance testing methodology and framework for protocol Recommendations for ITU-T applications – Requirements on test laboratories and clients for the conformance assessment process |
 |
This Recommendation specifies requirements on both the test laboratory and client, for the conduct of the conformance assessment process. The requirements are those necessary to achieve comparability of results of tests on similar implementations performed by different test laboratories. This Recommendation also provides some guidance on the conformance assessment process. The text was developed jointly with ISO/IEC JTC1 and the main intent of this revision is to reflect the changes as a result of the work on Protocol Profile Testing Methodology (PPTM) and on Multi-Party Testing Methodology (MPyTM). |
|
| Citation: |
https://handle.itu.int/11.1002/1000/2907 |
| Series title: |
X series: Data networks, open system communications and security X.200-X.299: Open Systems Interconnection X.290-X.299: Conformance testing |
| Approval date: |
1995-04-10 |
| Identical standard: | ISO/IEC 9646-5:1994 (Twinned) |
| Approval process: | TAP |
|
Status: |
In force |
|
Maintenance responsibility: |
ITU-T Study Group 11 |
|
Further details: |
Patent statement(s)
|
|
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
|
X Suppl. 4 (09/2008)
|
ITU-T X.290-series – Supplement on generic approach to interoperability testing
|
In force
|
here
|
here
|
here
|
|
X Suppl. 5 (09/2008)
|
ITU-T X.290 series – Supplement on interoperability testing framework and methodology
|
In force
|
here
|
here
|
here
|
| Title |
Approved on |
Download |
|
OSI Implementers’ Guide - Version 1.1
|
2006-12-16
|
here
|
| Title |
Approved on |
Download |
|
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|
ISDN field trial guidelines
|
1991
|
here
|
|