Tecnología de la información – Técnicas de seguridad – Objetos de información de seguridad para contro de acceso |
 |
Esta Recomendación | Norma Internacional proporciona definiciones de objeto que, en muchas ocasiones, son necesarias en normas de seguridad para evitar la existencia de múltiples definiciones diferentes de la misma funcionalidad. Mediante el uso de la notación de sintaxis abstracta uno (ASN.1) se asegura la precisión de estas definiciones.Esta Recomendación | Norma Internacional trata solamente los aspectos estáticos de los objetos de información de seguridad (SIO). |
|
Citation: |
https://handle.itu.int/11.1002/1000/5051 |
Series title: |
X series: Data networks, open system communications and security X.800-X.849: Security |
Approval date: |
2000-10-06 |
Identical standard: | ISO/IEC 15816:2002 (Common) |
Provisional name: | X.sio |
Approval process: | WTSA |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.841 (10/2000)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 2 (09/2007)
|
ITU-T X.800-X.849 series – Supplement on security baseline for network operators
|
In force
|
here
|
here
|
here
|
X Suppl. 3 (04/2008)
|
ITU-T X.800-X.849 series – Supplement on guidelines for implementing system and network security
|
In force
|
here
|
here
|
here
|
X Suppl. 15 (09/2012)
|
ITU-T X.800-X.849 series - Supplement on guidance for creating a national IP-based public network security centre for developing countries
|
In force
|
here
|
here
|
here
|
X Suppl. 16 (09/2012)
|
ITU-T X.800-X.849 series – Supplement on architectural systems for security controls for preventing fraudulent activities in public carrier networks
|
In force
|
here
|
here
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Security in telecommunications and information technology (8th edition)
|
2024
|
here
|
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security in telecommunications and information technology (7th edition)
|
2020
|
here
|
Security in Telecommunications and Information Technology
|
2015
|
here
|
Security in Telecommunications and Information Technology
|
2011
|
here
|
Security in Telecommunications and Information Technology
|
2004
|
here
|
Security in Telecommunications and Information Technology
|
2003
|
here
|
|