| 
    
            
                
                    | 
                            
                                | Tecnología de la información – Interconexión de sistemas abiertos – Gestión de sistemas: Función de sumario |  |  
                                | La presente Recomendación | Norma Internacional especifica métodos para observar y señalar valores de atributo para fines relacionados con el funcionamiento. Los atributos pueden ser del mismo tipo o de tipos diferentes. Los resultados de las observaciones se pueden proporcionar a través de notificaciones según se recopilan o "se almacenan en memoria tampón" y proporcionarlos en bloque. |  |  
                    | 
 
                            
                                | Citation: | https://handle.itu.int/11.1002/1000/3080 |  
                                | Series title: | X series: Data networks, open system communications and security X.700-X.799: OSI management
 X.730-X.799: Management functions and ODMA functions
 |  
                                | Approval date: | 1993-11-16 |  | Identical standard: | ISO/IEC  10164-13:1995 (Common) |  | Approval process: | TAP |  
                                | Status: | In force |  
                                | Maintenance responsibility: | ITU-T Study Group 2 |  
                                | Further details: | Patent statement(s) 
 |  |  
    
    
    
 | 
		
			| 
				
					
						
                                    
   
    
        
            | X.738 (1993-11) |  
            | Index of all ASN.1 assignments defined in this Recommendation. |  
            |  |  
							
            
                
                    | Click 
                        here 
                        to download all the modules of this Recommendation (zipped archive) |  
							    
            
                
                    | Click here to download all the modules needed to compile this Recommendation (zipped archive) |  
    
    
 
						
                                    
    
    
        
            | Title | Approved on | Download |  
                    | Guidelines for identity-based cryptosystems used for cross-domain secure communications | 2023 | here |  
                    | Overview of hybrid approaches for key exchange with quantum key distribution | 2022 | here |  
                    | Guidelines for security management of using artificial intelligence technology | 2022 | here |  
                    | Successful use of security standards (2nd edition) | 2020 | here |  
                    | Description of the incubation mechanism and ways to improve it | 2020 | here |  
                    | Strategic approaches to the transformation of security studies | 2020 | here |  
    
    
 |