Committed to connecting the world

ITU 150

ITU-T Recommendations - Under Traditional Approval Process

The traditional approval process (TAP) is described in WTSA Resolution 1, section 9. Section 8 of the same Resolution defines how selection is done between the traditional approval process and the alternative approval process (AAP) (see ITU-T Recommendation A.8) for the development and approval of Recommendations.

TAP Recommendations Under Approval Process
RecommendationsDeterminedCircularStudy GroupTitle
E.108 2015-03-27 -2Requirement for Disaster Relief Mobile Message Service
X.1246 2015-04-17 -17Technologies involved in countering voice spam in telecommunication organizations

TAP Recommendations approved during Study Period
RecommendationsStatusCircularsApproval DateStudy GroupTitle
A.23 Annex AIn ForceC15-085/C15-108 2014-06-20 TSAGGuide for ITU-T and ISO/IEC JTC 1 cooperation
E.129In ForceC14-309/C15-009 2013-01-31 2Presentation of national numbering plans
E.161 (2001) Amd. 1In ForceC15-72/C15-104 2014-06-06 2New Annex A: Arrangement of digits, Korean character set and symbols
E.1110In ForceC14-309/C15-009 2013-01-31 2Allocation and assignment of ITU-T E.164 country code 888
G.9700In ForceC15-063/C15-096 2014-04-04 15Fast access to subscriber terminals ( - Power spectral density specification
G.9901 (2012) Amd. 1SupersededC15-008/C15-046 2013-07-12 15-
G.9901In ForceC15-069/C15-096 2014-04-04 15Narrowband orthogonal frequency division multiplexing power line communication transceivers - Power spectral density specification
X.1154In ForceC14-311/C15-023 2013-04-26 17General framework of combined authentication on multiple identity service provider environments
X.1208In ForceC15-024/C15-56/C15-057/C15-080 2014-01-24 17A cybersecurity indicator of risk to enhance confidence and security in the use of telecommunication/information and communication technologies
X.1210In ForceC15-052/C15-080 2014-01-24 17Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks
X.1211In ForceC15-081/C15-122 2014-09-26 17Techniques for preventing web-based attacks
X.1243 (2010) Cor. 1In ForceC15-052/C15-080 2014-01-24 17-
X.1255In ForceC15-024/C15-053 2013-09-04 17Framework for discovery of identity management information
X.1520In ForceC15-052/C15-080 2014-01-24 17Common vulnerabilities and exposures
X.1525In ForceC15-123/C15-149 2015-04-17 17Common weakness scoring system
X.1526SupersededC14-311/C15-023 2013-04-26 17Open Vulnerability and Assessment Language
X.1526In ForceC15-052/C15-080 2014-01-24 17Language for the open definition of vulnerabilities and for the assessment of a system state
X.1544In ForceC14-311/C15-023 2013-04-26 17Common attack pattern enumeration and classification
X.1546In ForceC15-052/C15-080 2014-01-24 17Malware attribute enumeration and characterization
X.1582In ForceC15-052/C15-080 2014-01-24 17Transport protocols supporting cybersecurity information exchange
X.1601In ForceC15-052/C15-080 2014-01-24 17Security framework for cloud computing
Y.1271In ForceC15-090/C15-110 2014-07-18 13Framework(s) on network requirements and capabilities to support emergency telecommunications over evolving circuit-switched and packet-switched networks
Y.2705In ForceC14-302/C15-016 2013-03-01 13Minimum security requirements for the interconnection of the Emergency Telecommunications Service (ETS)
Y.2723In ForceC15-021/C15-067 2013-11-15 13Support for OAuth in next generation networks
Y.2724In ForceC15-021/C15-067 2013-11-15 13Framework for supporting OAuth and OpenID in next generation networks
Y.2725In ForceC15-076/C15-110 2014-07-18 13Support of OpenID in next generation networks
Y.2771In ForceC15-090/C15-110 2014-07-18 13Framework for deep packet inspection