Information technology – Message Handling Systems (MHS): Message store – Abstract service definition |
 |
This Recommendation is one of a series defining Message Handling in a distributed open systems environment. It defines the Message Store (MS) service which supports message retrieval from the MS, and message submission through the MS in a Message Handling System. It also provides message administration services.This edition has been revised to provide improved support in the following areas:- improved handling of authentication mechanisms when binding to the MS;- new attributes and procedures for managing multiple certificates in delivered and submitted messages;- improved handling of message tokens;- a new set of security errors;- facilities for recording the signature verification status of delivered messages;- additional matching rules;- additional attributes for correlating delivery reports.In addition, minor errors habe been removed, Message Store procedures have been revised and extended, and numerous clarifications have been introduced. |
|
Citation: |
https://handle.itu.int/11.1002/1000/4854 |
Series title: |
X series: Data networks, open system communications and security X.400-X.499: Message Handling Systems |
Approval date: |
1999-06-18 |
Identical standard: | ISO/IEC 10021-5:2003 (Common) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
Title |
Approved on |
Download |
MHS Implementers' Guide (Version 14, March 2000)
|
2000-03-01
|
here
|
MHS Implementers' Guide (Version 13, July 1995)
|
1995-07-01
|
here
|
MHS Implementers' Guide (Version 8, March 1992)
|
1992-03-01
|
here
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|