loading
ANSI X9 TR 51 - Levies Companion Document Uniform Adoption of X9.129 for Levies
July 26, 2020 - ASC/X9

Purpose of the Document The purpose of this document is to formalize an industry standard for exchange of legal orders using the ANSI X9.129 standard format and a compilation of industry norms. This document is not intended to replace the ANSI X9.129 standard, but rather to clarify how financial...

ANSI X9.80 - Prime Number Generation, Primality Testing, and Primality Certificates
April 9, 2020 - ASC/X9

In the current state of the art in public key cryptography, all methods require, in one way or another, the use of prime numbers as parameters to the various algorithms. This document presents a set of accepted techniques for generating prime numbers, often referred to as simply "primes". It is...

ITU-T X.609.5 - Managed P2P communications: Overlay management protocol
April 1, 2020 - ITU-T

This Recommendation specifies overlay management protocol for various services including multimedia streaming and content distribution over managed peer-to-peer infrastructure. This Recommendation describes the following details: - overview of overlay management protocol, - elements of protocol...

ITU-T X.677 - Identification mechanism for unmanned aerial vehicles using object identifiers
March 1, 2020 - ITU-T

This Recommendation analyses the requirements for full life-cycle management and operating identity recognition of unmanned aerial vehicles (UAVs) with security considerations. It also specifies an identification mechanism for UAVs using object identifiers (OIDs), including detailed specifications...

ITU-T X.1605 - Security requirements of public Infrastructure as a Service (IaaS) in cloud computing
March 1, 2020 - ITU-T

This Recommendation analyses security challenges faced by Infrastructure as a Service (IaaS) providers in IaaS environments, and specifies security requirements of public IaaS in cloud computing. This Recommendation is applicable for public IaaS providers. This is a high-level description of the...

ITU-T X.1372 - Security guidelines for vehicle-to-everything (V2X) communication systems
March 1, 2020 - ITU-T

This Recommendation provides security guidelines for vehicle-to-everything (V2X) communication. V2X is a generic term comprising the communication modes termed as vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I), vehicle-to-nomadic devices (V2D) and vehicle-to-pedestrian (V2P) when...

ITU-T X.1604 - Security requirements of Network as a Service (NaaS) in cloud computing
March 1, 2020 - ITU-T

This Recommendation analyses security threats and challenges on Network as a Service (NaaS) in cloud computing, and specifies security requirements of NaaS in NaaS application, NaaS platform and NaaS connectivity aspects based on corresponding cloud capability types.

ITU-T X.1365 - Security methodology for the use of identity-based cryptography in support of Internet of things (IoT) services over telecommunication networks
March 1, 2020 - ITU-T

This Recommendation specifies a security methodology for the use of identity-based cryptography (IBC) technology in support of Internet of things (IoT) services over telecommunications networks. This security methodology includes mechanisms for device identification, private key issue, public...

ITU-T X.1332 - Security guidelines for smart metering services in smart grids
March 1, 2020 - ITU-T

This Recommendation provides security guidelines for smart metering services in smart grids. It covers the following: - identification of security threats and attacks against smart metering services; - security requirements for smart metering services; and - security guidelines for smart metering...

ITU-T X.1364 - Security requirements and framework for narrowband Internet of things
March 1, 2020 - ITU-T

This Recommendation analyses potential deployment schemes and typical application scenarios for narrowband Internet of things (NB-IoT). It specifies security threats and requirements specific to NBIoT deployments and establishes a security framework for operators to safeguard applications of this...

ITU-T X.609.8 - Managed P2P communications: Management protocol for live data sources
December 1, 2019 - ITU-T

This Recommendation specifies a management protocol for data sources that generate live data continuously. The examples of live data include a live sensor data and a live CCTV stream, and they can be applicable to disaster recovery, autonomous vehicles, etc. The protocol specified by this...

ITU-T X.1702 - Quantum noise random number generator architecture
November 1, 2019 - ITU-T

This Recommendation provides a set of recommendations for a specific evaluation of entropy sources to distinguish non-quantum physical entropy sources from quantum physical entropy sources. It also provides the following specification regarding quantum physical entropy...

ITU-T X.1401 - Security threats to distributed ledger technology
November 1, 2019 - ITU-T

This Recommendation provides guidance and categorization on security threats to distributed ledger technology (DLT) components. Each of the threats is described in four dimensions: - targeted component; - attacks; - attack impact; and - attack likelihood. It also assigns an index to security...

ITU-T X.518 - Information technology – Open Systems Interconnection – The Directory: Procedures for distributed operation
October 1, 2019 - ITU-T

This Recommendation | International Standard specifies the behaviour of DSAs taking part in a distributed directory consisting of multiple Directory systems agents (DSAs) and/or LDAP servers with at least one DSA. The allowed behaviour has been designed to ensure a consistent service given a wide...

ITU-T X.525 - Information technology – Open Systems Interconnection – The Directory: Replication
October 1, 2019 - ITU-T

This Recommendation | International Standard specifies a shadow service which Directory system agents (DSAs) may use to replicate Directory information. The service allows Directory information to be replicated among DSAs to improve service to Directory users. The shadowed information is updated,...

ITU-T X.520 - Information technology – Open Systems Interconnection – The Directory: Selected attribute types
October 1, 2019 - ITU-T

This Recommendation | International Standard defines a number of attribute types and matching rules which may be found useful across a range of applications of the Directory. Attribute types and matching rules fall into three categories, as described below. Some attribute types and matching rules...

ITU-T X.1045 - Security service chain architecture for networks and applications
October 1, 2019 - ITU-T

This Recommendation discusses the security service chain in order to provide customized security services dynamically and adaptively for networks and applications. This Recommendation: - defines the security service chain and an architecture for security service chain; - designs procedures for...

ITU-T X.1232 - Technical framework for countering advertising spam in user-generated information
October 1, 2019 - ITU-T

This Recommendation specifies a technical framework for countering advertising spam in user-generated information (UGI). It covers scenarios of advertising spam in UGI, analyses types and characteristics of advertising spam, specifies a user feedback-based recognition mechanism, defines a reference...

ITU-T X.501 - Information technology – Open Systems Interconnection – The Directory: Models
October 1, 2019 - ITU-T

The models defined in this Recommendation | International Standard provide a conceptual and terminological framework for the other ITU-T X.500-series Recommendations | parts of ISO/IEC 9594 which define various aspects of the Directory. The functional and administrative authority models...

Advertisement