Security measures for location-enabled smart office services |
 |
Smart office services combining multiple smart applications aim to improve the quality of office-based businesses and enhance efficiency management. Since information and communication technologies (ICTs) serve as the basis for technologies in smart office services, the telecommunication operator plays an important role among the stakeholders in smart office services.
Typical smart office services include smart parking, smart driving, smart retail shop, smart office, smart meeting room management, smart water and smart energy consumption management. Among these typical smart office services, the location data provided by the operator is one of the key elements in most smart office service implementations.
In order to ensure the security of location-enabled smart office services, security threats and relevant security requirements specific to location-enabled services need to be analysed and the overall security measures established.
Recommendation ITU-T X.1454 analyses the typical application scenarios of location-enabled smart office services, specifies their security threats and requirements and establishes security measures for the operator and key stakeholders in a smart office to safeguard location-enabled services.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/15111 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1450-X.1459: Application Security (2) |
Approval date: |
2023-09-08 |
Provisional name: | X.sles |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1454 (09/2023)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|