| 
    
            
                
                    | 
                            
                                | Расширяемый язык разметки контроля доступа (XACML) 3.1 |  
                                | В Рекомендации МСЭ-T X.1144 (2013) проводится развитие расширяемого языка разметки контроля доступа (XACML 3.0), который является обновленной версией Рекомендации МСЭ-T X.1142 (эквивалент OASIS XACML 2.0 (06/2006)). В Рекомендации МСЭ-Т Х.1144 (2024) определена основа XACML, включая синтаксис языка, модели, контекст с моделью языка стратегии, правила синтаксиса и обработки информации. Данная Рекомендация с технической точки зрения эквивалентна стандарту OASIS XACML 3.1 и совместима с ним. |  |  
                    | 
 
                            
                                | Citation: | https://handle.itu.int/11.1002/1000/15877 |  
                                | Series title: | X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I)
 X.1140-X.1149: Web security (I)
 |  
                                | Approval date: | 2024-04-29 |  | Provisional name: | X.xacml3 |  | Approval process: | AAP |  
                                | Status: | In force |  
                                | Maintenance responsibility: | ITU-T Study Group 17 |  
                                | Further details: | Patent statement(s) Development history
 
 |  |  
    
    
    
 | 
		
			| 
				
					
						
                                    
    
        
            |  |  
							| ITU-T Supplement | Title | Status | Summary | Table of contents | Download |  
                    | X Suppl. 22 (01/2014) | ITU-T X.1144 - Supplement on enhancements and new features in eXtensible Access Control Markup Language (XACML 3.0) | In force | 
					here | 
					here | here |  
    
    
    
 
						
                                    
    
    
        
            | Title | Approved on | Download |  
                    | Guidelines for identity-based cryptosystems used for cross-domain secure communications | 2023 | here |  
                    | Overview of hybrid approaches for key exchange with quantum key distribution | 2022 | here |  
                    | Guidelines for security management of using artificial intelligence technology | 2022 | here |  
                    | Successful use of security standards (2nd edition) | 2020 | here |  
                    | Description of the incubation mechanism and ways to improve it | 2020 | here |  
                    | Strategic approaches to the transformation of security studies | 2020 | here |  
    
    
 |