| Security threats and requirements for information recommendation services |
 |
The information recommendation service is widely used in different websites and applications. For example, an educational information recommendation service is an important factor in sharing educational information. In the massive educational information, users can quickly find the educational information resources they need, meet users' learning needs and bring users a good learning experience. However, the security issues involved in information recommendation services cannot be ignored, e.g., data integrity threats, data poisoning, evasion attacks, etc.
Recommendation ITU-T X.1457 provides an analysis of security threats and requirements for information recommendation services. It identifies security threats involved in information recommendation services and specifies security requirements that address these security threats.
|
|
| Citation: |
https://handle.itu.int/11.1002/1000/16483 |
| Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1450-X.1459: Application Security (2) |
| Approval date: |
2025-12-11 |
| Provisional name: | X.str-irs |
| Approval process: | TAP |
|
Status: |
In force |
|
Maintenance responsibility: |
ITU-T Study Group 17 |
|
Further details: |
Patent statement(s)
Development history
[16 related work items in progress]
|
|
|
| Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
|
1
|
X.1457 (12/2025)
|
In force
|
here
|
here
|
here
|
| Title |
Approved on |
Download |
|
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|