Common alerting protocol (CAP 1.2) |
|
The common alerting protocol (CAP) is a simple but general format for exchanging all-hazard emergency alerts and public warnings over all kinds of networks. CAP allows a consistent warning message to be disseminated simultaneously over many different warning systems, thus increasing warning effectiveness while simplifying the warning task. CAP also facilitates the detection of emerging patterns in local warnings of various kinds, such as an undetected hazard or hostile act might indicate. CAP also provides a template for effective warning messages based on best practices identified in academic research and real-world experience.
Recommendation ITU-T X.1303 bis also provides both an XML schema definition (XSD) specification and an equivalent ASN.1 specification (which permits a compact binary encoding) and allows the use of abstract syntax notation one (ASN.1) as well as XSD tools for the generation and processing of CAP messages. This Recommendation enables existing systems, such as ITU-T H.323 systems, to more readily encode, transport and decode CAP messages. |
|
Citation: |
https://handle.itu.int/11.1002/1000/12150 |
Series title: |
X series: Data networks, open system communications and security X.1300-X.1499: Secure applications and services (II) X.1300-X.1309: Emergency communications |
Approval date: |
2014-03-01 |
Provisional name: | X.cap |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Click
here
to download all the modules of this Recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|