|
Subject |
Recommendation Series |
Number of Texts |
| Open Systems Interconnection |
X.200-X.299 |
48 |
Model and notation | X.200-X.209 | 2
|
Service definitions | X.210-X.219 | 11
|
Connection-mode protocol specifications | X.220-X.229 | 10
|
Connectionless-mode protocol specifications
| X.230-X.239 | 6
|
PICS proformas
| X.240-X.259 | 8
|
Protocol Identification
| X.260-X.269 | 3
|
Security Protocols
| X.270-X.279 | 2
|
Layer Managed Objects
| X.280-X.289 | 5
|
Conformance testing
| X.290-X.299 | 1
|
|
Message Handling Systems |
X.400-X.499 |
25 |
|
Directory |
X.500-X.599 |
13 |
|
OSI networking and system aspects |
X.600-X.699 |
42 + 1 Supp. |
Networking
| X.600-X.629 | 7
|
Efficiency
| X.630-X.639 | 6
|
Quality of service
| X.640-X.649 | 2
|
Naming, Addressing and Registration
| X.650-X.679 | 15 + 1 Supp.
|
Abstract Syntax Notation One (ASN.1)
| X.680-X.699 | 12
|
|
Security |
X.800-X.849 |
20 + 5 Supp. |
|
OSI applications |
X.850-X.899 |
14 |
Commitment, Concurrency and Recovery
| X.850-X.859 | 3
|
Transaction processing | X.860-X.879 | 4
|
Remote operations
| X.880-X.889 | 3
|
Generic applications of ASN.1
| X.890-X.899 | 4
|
|
Open distributed processing |
X.900-X.999 |
13 |
|
Information and network security |
X.1000-X.1099 |
48 + 7 Supp. |
Security orchestration and service access
| X.1000-X.1011 | 2
|
Network security
| X.1030-X.1049 | 17 + 1 Supp. |
Security management
| X.1050-X.1069 | 11+ 6 Supp. |
Telebiometrics
| X.1080-X.1099 | 18
|
|
Secure applications and services (1) |
X.1100-X.1199 |
44 + 9 Supp. |
Multicast security
| X.1100-X.1109 | 1
|
Home network security
| X.1110-X.1119 | 4 + 1 Supp. |
Mobile security
| X.1120-X.1139 | 7 + 2 Supp. |
Web security (1)
| X.1140-X.1149 | 9 + 4 Supp. |
Application security (1)
| X.1150-X.1159 | 10 + 2 Supp. |
Peer-to-peer security
| X.1160-X.1164 | 4
|
Data protection (1) and networked ID security
| X.1165-X.1179 | 1
|
IPTV security
| X.1180-X.1199 | 8
|
|
Cyberspace security |
X.1200-X.1299 |
55 + 18 Supp. |
Cybersecurity | X.1200-X.1229 | 16 + 5 Supp.
|
Countering spam
| X.1230-X.1249 | 17 + 9 Supp.
|
Identity management (IdM) and Authentication
| X.1250-X.1299 | 22 + 4 Supp.
|
|
Secure applications and services (2) |
X.1300-X.1499 |
61 |
Emergency communications
| X.1300-X.1309 | 2
|
Ubiquitous sensor network security
| X.1310-X.1319 | 4
|
Smart grid security
| X.1330-X.1339 | 3
|
Certified mail
| X.1340-X.1349 | 1
|
Internet of things (IoT) security
| X.1350-X.1369 | 13
|
Intelligent transportation system (ITS) security
| X.1370-X.1399 | 14
|
Distributed ledger technology (DLT) security
| X.1400-X.1429 | 15
|
Application Security (2)
| X.1450-X.1459 | 7
|
Web security (2)
| X.1470-X.1489 | 2
|
|
Cybersecurity information exchange |
X.1500-X.1599 |
21 |
Overview of cybersecurity
| X.1500-X.1519 | 2
|
Vulnerability/state exchange
| X.1520-X.1539 | 10
|
Event/incident/heuristics exchange
| X.1540-X.1549 | 4
|
Exchange of policies
| X.1550-X.1559 | 1
|
Identification and discovery
| X.1570-X.1579 | 1
|
Assured exchange
| X.1580-X.1589 | 3
|
|
Cloud computing security |
X.1600-X.1699 |
17 |
Overview of cloud computing security
| X.1600-X.1601 | 2
|
Cloud Computing security requirements, security capabilities
| X.1602-X.1629
| 6
|
Cloud Computing security best practices and guidelines | X.1640-X.1659 | 9
|
|
Quantum communication |
X.1700-X.1729 |
8 |
Quantum random number generator
| X.1702-X.1704 | 1
|
Quantum Key Distribution Network (QKDN)
| X.1705-X.1749 | 7
|
|
Data security |
X.1750-X.1799 |
5 |
Big Data Security
| X.1750-X.1759 | 3
|
Data protection (II)
| X.1770-X.1799 | 2
|
|
International Mobile Telecommunications (IMT) security |
X.1800-X.1839 |
10 + 1 Supp. |
IMT-2020 security
| X.1810-X.1839 | 10 + 1 Supp.
|
|
Metaverse and digital twin security |
X.2000-X.2199 |
4 |
Digital twins
| X.2000-X.2049 | 3
|
Smart community
| X.2050-X.2099 | 1
|
Other metaverse security
| X.2100-X.2149 | 0
|
Software supply chain security
| X.2150-X.2199 | 0 |
|
Artificial Intelligence (AI) / Machine Learning (ML) security |
X.2200-X.2249 |
0 |