ITU-T - International Telecommunication Union/ITU Telcommunication Sector: Recent submissions
Now showing items 141-160 of 12687
-
Session information message exchange format
Abstract: In today’s network environment, computer networks are vulnerable to threats from both inside and outside the organization. The firewall systems log session information about selected incoming and outgoing transmission ... -
Access control models for incident exchange networks
Abstract: Recommendation ITU-T X.1550 introduces existing approaches for implementing access control policies for incident exchange networks. This Recommendation introduces a variety of well-established access control models, sharing ... -
Security requirements for software as a service application environments
Abstract: Recommendation ITU-T X.1602 analyses the maturity levels of software as a service (SaaS) application and proposes security requirements to provide a consistent and secure service execution environment for SaaS applications. ... -
Guidelines for cloud service customer data security
Abstract: Recommendation ITU-T X.1641 provides generic security guidelines for the cloud service customer (CSC) data in cloud computing. It analyses the CSC data security lifecycle and proposes security requirements at each stage ... -
Guidelines of operational security for cloud computing
Abstract: Recommendation ITU-T X.1642 provides generic operational security guidelines for cloud computing from the perspective of cloud service providers (CSPs). It analyses the security requirements and metrics for the operation ... -
ITU-T X.509 (2012) Cor. 2 (04/2016)
Abstract: Technical Corrigendum 2 to Rec. ITU-T X.509 (2012) | ISO/IEC 9594-8:2014 covers resolution to defect reports 406, 407, 408, 409, 410, 411, 412, 413, 414, 415, 416, 417, 418, 419 and 420. -
Common vulnerability scoring system
Abstract: Recommendation ITU-T X.1521 on the common vulnerability scoring system (CVSS) provides an open framework for communicating the characteristics and impacts of information and communication technologies (ICT) vulnerabilities ... -
Secure software update capability for intelligent transportation system communication devices
Abstract: As intelligent transportation system (ITS) technologies improve, it has become common for vehicles to communicate with other entities such as other vehicles, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ... -
Revised structured cybersecurity information exchange techniques
Abstract: Amendment 11 to Recommendation ITU-T X.1500 (2011) provides a list of structured cybersecurity information techniques that have been created to be continually updated as these techniques evolve, expand, are newly identified ... -
Revised structured cybersecurity information exchange techniques
Abstract: Amendment 10 to Recommendation ITU-T X.1500 (2011) provides a list of structured cybersecurity information techniques that have been created to be continually updated as these techniques evolve, expand, are newly identified ... -
Revised structured cybersecurity information exchange techniques
Abstract: Amendment 9 to Recommendation ITU-T X.1500 (2011) provides a list of structured cybersecurity information techniques that have been created to be continually updated as these techniques evolve, expand, are newly identified ... -
Interfaces for the optical transport network
Abstract: Recommendation ITU-T G.709/Y.1331 defines the requirements for the optical transport network (OTN) interface signals of the optical transport network, in terms of: -
Technical framework for countering mobile messaging spam
Abstract: Mobile messaging spam is proliferating dramatically along with the fast development of mobile messaging services. Unfortunately, no single measure has proved to be the silver bullet against mobile messaging spam. Therefore, ... -
Guidelines and framework for sharing network authentication results with service applications
Abstract: With the surge of mobile devices and applications accessing the Internet, the network and the service environment are becoming increasingly complicated. As a result, there is a pressing need to simplify the user authentication ... -
Design considerations for improved end-user perception of trustworthiness indicators
Abstract: Diverse kinds of attacks employ replicated content from trustworthy service providers, thereby deceiving end-users into believing its false trustworthiness. -
Simple encryption procedure for Internet of things (IoT) environments
Abstract: It is considered that the Internet of things (IoT) is one of the most important areas for future standardization. From the ITU-T perspective, IoT is defined as a global infrastructure for the information society, enabling ... -
Enhanced entity authentication based on aggregated attributes
Abstract: Aggregating attributes from multiple attribute authorities may be needed in order to enable a relying party to enhance its trust in the identity of a party. The aggregation can be regarded as having to deal with a collection ... -
Identity and access management taxonomy
Abstract: Recommendation ITU-T X.1257 develops a specification to ensure that necessary business meaning is assigned to IAM roles and permissions and that this business meaning is traceable and reference-able throughout IAM process ... -
Technical and operational countermeasures for telebiometric applications using mobile devices
Abstract: Biometric technology in mobile devices is frequently used in various areas which require a high level of reliability such as e-banking, and procurement services. It is necessary to make efforts to develop a security system ... -
Access control for telebiometrics data protection
Abstract: Recommendation ITU-T X.1080.0, Access control for telebiometrics data protection, is a specification for how to protect telebiometrics information against unauthorized access. It does so by taking a service-oriented view, ...