Correlative Reacting System in mobile data communication |
 |
In a mobile network environment, while core networks are able to manage security threats, mobile stations (MSs) that access the mobile network have little defence capability due to limited hardware resources. Compromised mobile stations can themselves easily become virus agents and threaten the entire network. The Correlative Reacting System (CRS) defined in this Recommendation aims to protect mobile networks against the threats of insecure terminals that do not conform to the security policy of the network, such as terminals that have been compromised. |
|
Citation: |
https://handle.itu.int/11.1002/1000/9260 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (1) X.1120-X.1139: Mobile security |
Approval date: |
2008-01-13 |
Provisional name: | X.crs |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1125 (01/2008)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 19 (04/2013)
|
ITU-T X.1120-X.1139 series – Supplement on security aspects of smartphones
|
In force
|
here
|
here
|
here
|
X Suppl. 24 (09/2014)
|
ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices
|
In force
|
here
|
here
|
here
|
X.1125 (2008-01)
|
Index of all ASN.1 assignments defined in this Recommendation.
|
|
Click
here
to download all the modules of this recommendation (zipped archive)
|
Click here to download all the modules needed to compile this Recommendation (zipped archive)
|
Title |
Approved on |
Download |
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|