temporary document · web viewthis recommendation describes heterarchic security architecture for...

61
Draft new and revised Recommendations and related texts under development in SG 17 (as of 09 June 2011) Q (1) Acronym Title New/ Revise d Editor(s) Location of Text Equivalent e.g., ISO/IEC Timing** * 2 X.gsiiso Guidelines on security of the individual information service for operators New Yuanfei Huang, Lijun Liu, Ziqin Sang, Huirong Tian TD 1676 2012-09 2, (7), (10) X.hsn* Heterarchic architecture for secure distributed service networks New Yuri Pankratov TD 1873 2012-09 2 X.ipv6- secguide Technical guideline on deploying IPv6 New Koji Nakao, Jungsuk Song C 454, TD 1804 2012-09 2 X.ncns-1* National IP-based public network security center for developing countries New Dmitry Kostrov TD 1887 Rev.1 2012-09 2 X.rev* Architectural systems for security controls for preventing fraudulent activities in public carrier networks New Roman Khokhlov TD 1809 Rev.1 2011-09 3 X.1052 (X.ismf) Information security management framework New Minshi Chen, Lijun Liu, Zhi Zhou AAP text (TD 1513 Rev.3) 2011-04

Upload: vucong

Post on 10-Jun-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Draft new and revised Recommendations and related texts under development in SG 17(as of 09 June 2011)

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

2 X.gsiiso Guidelines on security of the individual information service for operators

New Yuanfei Huang,Lijun Liu,Ziqin Sang,Huirong Tian

TD 1676 2012-09

2,(7),(10)

X.hsn* Heterarchic architecture for secure distributed service networks

New Yuri Pankratov TD 1873 2012-09

2 X.ipv6-secguide Technical guideline on deploying IPv6 New Koji Nakao,Jungsuk Song

C 454,TD 1804

2012-09

2 X.ncns-1* National IP-based public network security center for developing countries

New Dmitry Kostrov TD 1887 Rev.1 2012-09

2 X.rev* Architectural systems for security controls for preventing fraudulent activities in public carrier networks

New Roman Khokhlov TD 1809 Rev.1 2011-09

3 X.1052(X.ismf)

Information security management framework

New Minshi Chen,Lijun Liu,Zhi Zhou

AAP text(TD 1513 Rev.3)

2011-04

3 X.1057(X.amg)

Asset management guidelines in telecommunication organizations

New Taein Jung,Jintae Lee

AAP text(TD 1688 Rev.4)

2011-04

3 X.isgf* Information technology – Security techniques - Information security governance framework

New Jungduk Kim C 442 ISO/IEC 27014 2012-03

3 X.mgv6 Security management guideline for implementation of IPv6 environment in telecommunications organizations

New Koji Nakao,Jungsuk Song

TD 1803 2012-09

- 2 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

3 X.rmsm Information security management reference model for small and medium-sized telecommunication organizations

New Chung Yun Chung,Hang Bae Jang,Sang Soo Jang

COM 17 – R 24 Annex C

Attachment 1

TBD

3 X.sgsm Information security management guidelines for small and medium telecommunication organizations

New Hangbae Chang,Chungyun Chung,Sangsoo Jang,Wataru Senga

TD 1727 2012-03

4 X.1211(X.tb-ucc)*

Usability of network traceback New Takeshi Takahashi,Huirong Tian,Heung Youl Youm

COM 17 – R 33 2011-04

4 X.1303 Common alerting protocol (CAP 1.2) Revised Anthony Rutkowski,Olivier Dubuisson

TD 1629 2011-09

4, (12)

X.1570(X.cybex-disc)*

Discovery mechanisms in the exchange of cybersecurity information

New Youki Kadobayashi,Takeshi Takahashi

COM 17 – R 35 2011-04

4 X.abnot* Abnormal traffic detection and control guideline for telecommunication network

New Lijun Liu TD 1187 Rev.1 2012-09

4 X.arf* Assessment result format New Robert A. Martin TD 0943 Rev.1 2012-094 X.bots* Centralized framework for botnet

detection and responseNew Chaetae Im,

Hyun Cheol Jeong,Mi Joo Kim,Joo Hyung Oh,Yoo Jae Won

TD 1362 2012-09

4 X.capec* Common attack pattern enumeration and classification

New Robert A. Martin TD 1168 Rev.1 2012-03

4 X.cce* Common configuration enumeration New Robert A. Martin TD 1554 2012-034 X.cee* Common event expression New Robert A. Martin TD 0943 Rev.1 2012-094 X.cpe* Common platform enumeration New Robert A. Martin TD 1190 Rev.1 2012-094 X.csi* Guidelines for cybersecurity index New Damir Rajnovic,

Heung Youl YoumTD 1775 2012-09

- 3 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

4 X.csmc* Continuous security monitoring using CYBEX techniques

New Inette Furey,Bob Martin,Kathleen Moriarty,Youki Kadobayashi,Takeshi Takahashi

TD 1732 Rev.2 2012-09

4 X.cwe* Common weakness enumeration New Robert A. Martin TD 1169 Rev.1 2012-034,

(12)X.cybex.1* Procedures for the registration of arcs

under the object identifier (OID) arc for cybersecurity information exchange

New Olivier Dubuisson,Anthony Rutkowski

TD 1602 2011-09

4 X.cwss* Common weakness scoring system New Robert A. Martin TD 1166 Rev.1 2012-094 X.cybex-beep* A BEEP profile for cybersecurity

information exchange techniquesNew Youki Kadobayashi TD 1335 Rev.1 2012-09

4 X.cybex-tp* Transport protocols supporting cybersecurity information exchange

New Youki Kadobayashi,Damir Rajnovic

TD 0818 2012-09

4 X.cyiql* Cybersecurity information query language

New Youki Kadobayashi TD 0714 2012-09

4 X.dexf* Digital forensics exchange format New Youn-Hee Gil,Dowon Hong,Sung Kyong Un,Anthony Rutkowski

C 452 2012-09

4 X.eipwa* Guideline on techniques for preventing web-based attacks

New Xie Wei,Heung Youl Youm

TD 1776 2012-09

4 X.gopw** Draft supplement to Recommendation ITU-T X.1205 - Supplement on guidelines for reducing malware in ICT networks

New Hyun Cheol Jung,Mi Joo Kim,Heung Youl Youm

TD 1791 Rev.1 2011-09

4 X.gpn* Mechanism and procedure for distributing policies for network security

New Shuyi Chen,Hui Dong,Lijun Liu

TD 1359 2012-09

4 X.iodef* Incident object description exchange format

New Anthony Rutkowski TD 1233 Rev.1 2012-03

- 4 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

4 X.maec* Malware attribute enumeration and classification

New Robert A. Martin TD 1191 Rev.1 2012-09

4 X.oval* Open vulnerability and assessment language

New Robert A. Martin TD 1167 Rev.1 2011-09

4 X.pfam* Misuse enumeration and characterization

New Igor Polyakov,Anthony Rutkowski,Yuri Ryazantsev

TD 1545 2012-09

4 X.rid* Real-time inter-network defense New Kathleen Moriarty, Tom Millar

TD 1594 Rev.1 2011-09

4 X.ridt* Transport of real-time inter-network defense (RID) messages

New Kathleen Moriarty,Tom Millar

TD 1597 Rev.1 2011-09

4 X.sip-cyber* Security guidelines for countering cyber attacks in SIP-based services

New Hyun Cheol Jeong,Hyung-Woo Lee,Anthony Rutkowski

TD 1735 2012-09

4 X.sips* Framework for countering cyber attacks in SIP-based services

New Hwan Kuk Kim,Kyoung Hee Ko

TD 1305 2012-09

4 X.sisnego* Framework of security information sharing negotiation

New Gae-il An TD 1689 2012-09

4,(12)

X.ssaf* Security standards availability framework

New Anthony Rutkowski TD 1593 2012-09

4 X.trm* Overview of traceback mechanisms New Youki Kadobayashi,Anthony Rutkowski,Huirong Tian,Heung Youl Youm

TD 1780 Rev.1 2012-09

4 X.xccdf* Extensible configuration checklist description format

New Robert A. Martin TD 1192 Rev.1 2012-09

5 X.1246(X.tcs-2)*

Real-time blocking list (RBL)-based framework for countering VoIP spam

New Seokung Yoon COM 17 – R 34Notes (2), (3)

2011-04

5 X.ics* Functions and interfaces for countering email spam using botnet information

New Chaetae Im,Joo Hyung Oh

TD 1280 2011-09

- 5 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

5 X.oacms* Overall aspects of countering messaging spam in mobile networks

New Min Huang,Linlin Zhang

TD 1770 Rev.1 2012-03

6 X.1192(X.iptvsec-2)

Functional requirements and mechanisms for the secure transcodable scheme of IPTV

New Jae Hoon Nah AAP text(TD 1772 Rev.3)

2011-04

6 X.iptvsec-3 Key management framework for secure IPTV services

New Heung Youl Youm TD 1777 2011-09

6 X.iptvsec-4 Algorithm selection scheme for service and content protection (SCP)

descrambling

New Nhut Nguyen,Jongyoul Park

TD 1712 2011-09

6 X.iptvsec-6 Framework for the downloadable service and content protection (SCP) system in the mobile IPTV environment

New Heung Youl Youm TD 1778 2012-03

6 X.iptvsec-7 Guidelines on criteria for selecting cryptographic algorithms for the IPTV service and content protection (SCP)

New Seokung Yoon,HeungYoul Youm

TD 1779 2012-03

6 X.iptvsec-8 Virtual machine-based security platform for renewable IPTV service and content protection (SCP)

New Yong Ho Hwang,Jongyoul Park

TD 1721 Rev.1 2012-09

6 X.msec-5 Security requirements and mechanism for reconfiguration of mobile device with multiple communication interfaces

New Gaeil Ahn,Guntae Bae,Kiyoung Kim

TD 0470 Rev.2 2012-03

6 X.msec-6 Security aspects of mobile phones New Hongwei Luo,Yutaka Miyake

TD 1798 2012-03

6 X.unsec-1 Security requirements and framework of ubiquitous networking

New Xia Junjie,Lijun Liu,Wang Shitong

TD 1796 Rev.1 2012-03

6 X.usnsec-3 Secure routing mechanisms for wireless sensor network

New Eunyoung Choi TD 1000 Rev.1 2012-03

- 6 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

7,(10)

X.1141 Amd.1 Security Assertion Markup Language (SAML) 2.0-Amendment 1

New Abbie Barbir TDs 1571, 1572, 1573, 1574, 1575, 1577, 1578, 1579, 1580, 1581, 1582, 1583, 1584, 1585,

1586, 1587, 1588

OASIS SAML 2.0

2011-09

7,(10)

X.1142Amd. 1

eXtensible Access Control Markup Language (XACML 2.0)-Amendment 1

New Abbie Barbir TDs 1556, 1557, 1569

OASIS XACML 2.0

2012-09

7 X.p2p-3 Security requirements and mechanisms of peer-to-peer based telecommunication network

New Lijin Liu TD 1418 2012-09

7 X.p2p-4 Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks

New Ayumu Kubota,Yutaka Miyake

TD 1722 Rev.2 2012-09

7,(10)

X.sap-4* The general framework of combined authentication on multiple identity service provider environment

New Tadashi Kaji,H.J. Lim

TD 1328 2012-09

7 X.sap-5 Guideline on anonymous authentication for e-commerce service

New Sok Joon Lee TD 1094 2012-09

7 X.sap-6 One time password based non-repudiation framework

New Keun-ok Kim,Hee-won Shim

TD 1808 Rev.2 1Q 2013

7,(8)

X.websec-4 Security framework for enhanced web based telecommunication services

New Jaehoon Nah,DaeHee Seo

TD 1673 2011-09

- 7 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

7,(10)

X.xacml3 eXtensible Access Control Markup Language (XACML) 3.0

New Abbie Barbir TDs 1570, 1568, 1567, 1566, 1565, 1564, 1563, 1562, 1561, 1560, 1559, 1558

OASIS XACML 3.0

2012-09

8 X.ccsec Security guideline for cloud computing in telecommunication area

New Shitong Wang,Huirong Tian,Liang Wei

TD 1704 2012-03

8,(7)

X.fsspvn Framework of the secure service platform for virtual network

New Min Huang,Jun Shen,Huirong Tian,Yuchen Wang

TD 1724 2012-09

8 X.sfcsc Security functional requirements for SaaS application environment

New Peng Zhao,Zhaoji Lin,Xiaoming Guang

TD 1710 Rev.3 2013-Q4

8 X.srfctse Security requirements and framework of cloud based telecommunication service environment

New Huirong Tian,Shitong Wang

TD 1767 2012-03

9 X.1090(X.ott)

Authentication framework with one-time telebiometric template

New Hyung-Woo Lee,Yongjin Lee

AAP text(TD 1820 Rev.1)

2011-04

9 X.1081 Amd.3 The telebiometric multimodal model – A framework for the specification of security and safety aspects of telebiometrics - Amendment 3: Enhancement to support a new modality “ELECTRO” and define new object identifiers

New Jean-Paul Lemaire TD 1810 2011-09

- 8 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

9 X.1086Amd. 1

Telebiometric protection procedures – A guideline to technical and managerial countermeasures for biometric data security – Amendment 1: Multibiometric protection procedures

New Inja Jun,Hakil Kim

TD 1816 2011-09

9 X.bhsm Telebiometric authentication framework using biometric hardware security module

New Myung Geun Chun,Yong Nyuo Shin

TD 1807 2012-09

9 X.gep A guideline for evaluating telebiometric template protection techniques

New Yoshiaki Isobe,Tetsushi Ohki

TD 1826 2012-03

9 X.th1 e-Health and world-wide telemedicines – Generic telecommunication protocol

New Jean-Paul Lemaire TD 1814 2011-09

9 X.th2* Telebiometrics related to physics New Jean-Paul Lemaire TD 0800 ISO 80003-2 2012-03

9 X.th3* Telebiometrics related to chemistry New Jean-Paul Lemaire TD 1672 ISO 80003-3 2011-09

9 X.th4* Telebiometrics related to biology New Jean-Paul Lemaire TD 0090 IEC 80003-4 2012-039 X.th5* Telebiometrics related to culturology New Jean-Paul Lemaire TD 0091 IEC 80003-5 2012-039 X.th6* Telebiometrics related to psychology New Jean-Paul Lemaire TD 0092 IEC 80003-6 2012-039 X.tif Integrated framework for telebiometric

data protection in e-health and worldwide telemedicines

New Hong Sun Jung,Hakil Kim,Yong Nyuo Shin

TD 1818 2012-09

10 X.1253(X.idmsg)*

Security guidelines for identity management systems

New Sangrae Cho COM 17 – R 38 2010-04

10 X.1261(X.EVcert)*

Extended validation certificate framework (EVcert)

New Anthony Rutkowski COM 17 – R 30 CA/Browser Forum Evcert specification

2011-09

10 X.atag* Attribute aggregation framework New David W Chadwick,Ryu Watanabe

TD 1734 Rev.1 2012

10 X.authi* Guideline to implement the authentication integration of the network layer and the service layer

New Lijun Liu TD 0918 2012

- 9 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

10 X.discovery* Discovery of identity management information

New Robert Kahn TD 1547 Rev.4 2012

10 X.eaa* Information technology – Security techniques – Entity authentication assurance framework

New Richard Brackney TD 1452 Rev.1 ISO/IEC 29115 2012

10 X.giim* Mechanisms to support interoperability across different IdM services

New Jing Wu TD 1360 2012

10,(8)

X.idmcc* Requirement of IdM in cloud computing

New Xiao Ming Guang,Jing Wu

TD 1675 Rev.2 2012

10 X.idmgen* Generic identity management framework

New Richard Brackney,Zhaoji Lin

TD 1042 2012

10 X.idm-ifa* Framework architecture for interoperable identity management systems

New Marcin Dąbrowski,Piotr Pacyna

TD 0631 Rev.2 2012

10 X.mob-id* Baseline capabilities and mechanisms of identity management for mobile applications and environment

New Sangrae Cho TD 1731 2012

10 X.oitf* Open identity trust framework New ZhaoJi Lin,Mary Rundle

TD 1553 Rev.2 2012

10 X.priva* Criteria for assessing the level of protection for personally identifiable information in identity management

New Hyangjin Lee TD 0640 2012

11,(10)

F.5xx Directory Service - Support of Tag-based Identification Services

New Erik Andersen TD 1691 Rev.1 2012

11 X.500 Information technology – Open Systems Interconnection –The Directory: Overview of concepts, models and services

Revised Erik Andersen ISO/IEC 9594-1

2012

11 X.501 Information technology – Open Systems Interconnection –The Directory – Models

Revised Erik Andersen ISO/IEC 9594-2

2012

- 10 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

11 X.509 Information technology – Open Systems Interconnection –The Directory – Public-key and attribute certificate frameworks

Revised Hoyt Kesterson ISO/IEC 9594-8

2012

11 X.511 Information technology – Open Systems Interconnection –The Directory – Abstract Service Definition

Revised Erik Andersen ISO/IEC 9594-3

2012

11 X.518 Information technology – Open Systems Interconnection –The Directory – Procedures for Distributed Operations

Revised Erik Andersen ISO/IEC 9594-4

2012

11 X.519 Information technology – Open Systems Interconnection –The Directory – Protocols

Revised Erik Andersen ISO/IEC 9594-5

2012

11 X.520 Information technology – Open Systems Interconnection –The Directory – Selected Attribute Types

Revised Erik Andersen ISO/IEC 9594-6

2012

11 X.521 Information technology – Open Systems Interconnection –The Directory – Selected object classes

Revised Erik Andersen ISO/IEC 9594-7

2012

11 X.525 Information technology – Open Systems Interconnection –The Directory – Replication

Revised Erik Andersen ISO/IEC 9594-9

2012

12 X.660 Information technology – Procedures for the operation of Object Identifier Registration Authorities: General procedures and top arcs of the International Object Identifier tree

Revised Olivier Dubuisson AAP text(TD 1484 Rev.1)

ISO/IEC 9834-1

2011-04

13 Z.100 Specification and description language: Overview of SDL-2010

Revised Rick Reed TD 1610 Rev.1 2011-09

13 Z.101 Specification and description language: Basic SDL-2010

New Rick Reed TD 1611 Rev.1 2011-09

- 11 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

13 Z.102 Specification and description language: Comprehensive SDL-2010

New Rick Reed TD 1612 Rev.1 2011-09

13 Z.103 Specification and description language: Shorthand notation and annotation in SDL-2010

New Rick Reed TD 1613 Rev.1 2011-09

13 Z.104 Specification and description language: Data and action language in SDL-2010

Revised Rick Reed TD 1614 Rev.1 2011-09

13 Z.105 Specification and description language: SDL-2010 combined with ASN.1 modules

Revised Rick Reed TD 1615 Rev.1 2011-09

13 Z.109 Specification and description language: SDL-2010 combined with UML

Revised Alexander Kraas TD 1627 2012

13 Z.120 Message sequence chart (MSC) Revised Rick Reed TBD13 Z.151 User requirements notation (URN) –

Language definitionRevised Daniel Amyot TBD

13 Z.151 Cor.1 User requirements notation (URN) – Language definition

New Daniel Amyot 2011-09

13 Z.uml-msc Unified modeling language (UML) profile for MSC

New Thomas Weigert TD 0444,TD 3308

[2005-2008]

TBD

13 Z.uml-urn-grl Unified modeling language (UML) profile for URN GRL

New Daniel Amyot 2011-09

13 Z.uml-urn-ucm Unified modeling language (UML) profile for URN UCM

New Thomas Weigert TBD

13 Z.Imp100** Specification and description language Implementers' Guide – Version 2.0.0 Revised Rick Reed TD 0462 Rev.1 2011-09

13 Z.Suppl.1** Supplement 1 to Z-series Recommendations – ITU-T Z.100-series – Supplement on methodology on the use of description techniques

Revised Thomas Weigert 2012-02

- 12 -

Q(1) Acronym Title New/ Revised Editor(s) Location of Text Equivalent

e.g., ISO/IEC Timing***

14 Z.161 Testing and Test Control Notation version 3: TTCN-3 core language

Revised Dieter Hogrefe ETSI ES 201 873-1

2012-03

14 Z.162 Testing and Test Control Notation version 3: TTCN-3 tabular presentation format (TFT)

Revised Dieter Hogrefe ETSI ES 201 873-2

2012-03

14 Z.163 Testing and Test Control Notation version 3: TTCN-3 graphical presentation format (GFT)

Revised Dieter Hogrefe ETSI ES 201 873-3

2012-03

14 Z.164 Testing and Test Control Notation version 3: TTCN-3 operational semantics

Revised Dieter Hogrefe ETSI ES 201 873-4

2012-03

14 Z.165 Testing and Test Control Notation version 3: TTCN-3 runtime interface (TRI)

Revised Dieter Hogrefe ETSI ES 201 873-5

2012-03

14 Z.166 Testing and Test Control Notation version 3: TTCN-3 control interface (TCI)

Revised Dieter Hogrefe ETSI ES 201 873-6

2012-03

14 Z.167 Testing and Test Control Notation version 3: TTCN-3 mapping from ASN.1

Revised Dieter Hogrefe ETSI ES 201 873-7

2012-03

14 Z.168 Testing and Test Control Notation version 3: TTCN-3 mapping from CORBA IDL

Revised Dieter Hogrefe ETSI ES 201 873-8

2012-03

14 Z.169 Testing and Test Control Notation version 3: TTCN-3 mapping from XML data definition

Revised Dieter Hogrefe ETSI ES 201 873-9

2012-03

14 Z.170 Testing and Test Control Notation version 3: TTCN-3 documentation comment specification

Revised Dieter Hogrefe ETSI ES 201 873-10

2012-03

Notes:* Marked draft Recommendations are for determination; others are for consent.

- 13 -

** Texts for approval (AAP/TAP not applicable)*** Target date for consent or determination of Recommendations or for approval of Appendices, Supplements or Implementers' Guides(1) SG 17 Question. In case of joint Question activity, the lead Question is given without parentheses and other Questions are shown in parentheses; such

entries are only shown in the table against the lead Question.

The following items were deleted from the work program:

o X.1086 Amd. 2, Telebiometric protection procedures – A guideline to technical and managerial countermeasures for biometric data security – Amendment 2: protection procedure for telebiometrics information from video surveillance system.

o Z.urn-ma, User requirements notation (URN) - Methodological approach.

- 14 -

Summaries for Recommendations and associated texts under development in Study Group 17

WORKING PARTY 1/17 - NETWORK AND INFORMATION SECURITY

Question 2/17 – Security architecture and framework

X.gsiiso, Guidelines on security of the individual information service for operators

This Recommendation addresses the aspects of security of the information service provided by the telecommunication operators. In the transforming from traditional basic network operator to comprehensive information service provider, the operators expand their services to content service and ICT. The new services not only change the operational models, and they also bring new security issues to be resolved.

This Recommendation provides the guideline on security of the individual information service for operators. The scope covers the classification of individual information service, the security requirement, the mechanism, and the coordination.

X.hsn, Heterarchic architecture for secure distributed service networks

This Recommendation describes heterarchic security architecture for distributed service networks (defined in Recommendation ITU-T Y.2206). The security architecture is based on the use of a system of network entity identifiers (or identity certificates) and a distributed system of storage and retrieval of information associated with these identifiers. Another aspect of the security architecture is a distributed trust management system and the security functions based on it. The security architecture is based on the use of an overlaying logical network and does not interfere with the basic service functionality.

X.ipv6-secguide, Technical security guideline on deploying IPv6

IPv6 is intended to provide many built-in benefits such as large address space, mobility, and quality of service (QoS). Because it is a new protocol and operates in some different ways than IPv4, both foreseeable and unforeseeable security issues are likely to arise. Many new functions or requirements of IPv6, i.e., automatic configuration of interfaces, mandatory IPsec, mandatory multicast, multiple IP addresses and many new rules for routing, can be abused for compromising computer systems or networks.

Considering the above circumstance, this Recommendation provides a set of technical security guides for telecommunications organizations to implement and deploy IPv6 environment. This Recommendation focuses on how to securely deploy network facilities for telecommunications organizations and how to ensure security operations for IPv6 environment.

X.ncns-1, National IP-based public network security center for developing countries

This Recommendation addresses creation of a secure, stable and resilient national IP-based network infrastructure. The necessity for technical coordination in creating a secured, stable and resilient infrastructure arises in the event of disruption (severe impairment of the quality of service performance) of a significant segment of a telecom operator’s network, which constitutes part of the public network (public networks). These incidents may occur due to technical problems, attacks like DDoS, attacks aimed at destructing network infrastructure, natural and anthropogenic disasters and other problems related to maintaining stability (accessibility of services and features) and security. Technical coordination in such circumstances implies gathering, analysis and management of information (including control information) regarding the detected alterations (in the national ICT) in order to elaborate proposals for national ICT restoration.

- 15 -

This Recommendation opens a new dimension in security standardization – collaboration security (alongside such dimensions as security management, exchange of security incident and event information, application security, identification management, etc.).

X.rev, Architectural systems for security controls for preventing fraudulent activities in public carrier networks

This Recommendation describes a methodology of evaluation systems for security controls for preventing fraudulent activities, criteria for selection of these systems, regarding architectural characteristics of communications service provider (CSP) networks according to CSPs present-day level of development. The Recommendation includes technical methods to address security controls and estimate losses due to fraudulent activities, and also provides guidelines for information exchange related to fraudulent activities.

Question 3/17 – Telecommunications information security management

X.1052 (X.ismf), Information security management framework

The Recommendation describes and recommends the framework of information security management for telecommunications to support Recommendation ITU-T X.1051 and other Recommendations such as ITU-T X.1055 etc. Information security management framework (ISMF) is based on a process approach to describe a set of security management areas which gives guidelines to telecommunications to fulfill the control object defined in Recommendation ITU-T X.1051 and other Recommendations such as ITU-T X.1055 etc. The management areas include asset management, incident management, risk management, policy management and so on, which map the controls defined by Recommendation ITU-T X.1051 to the implementation methodologies, so ISMF relates the Recommendation ITU-T X.1051 which gives the baselines for the telecommunications and other Recommendations, such as ITU-T X.1055 and ITU-T X.1056, which gives the practical methodologies focusing on a specific area of information security management.

X.1057 (X.amg), Asset management guidelines in telecommunication organizationsThis Recommendation provides guidelines for securely managing various assets including electronic information, paper, and IT system in telecommunication organizations. This Recommendation also contains main activities and methods for implementing asset management on the basis of PDCA (Plan – Do – Check – Act) process model.

X.isgf, Information technology – Security techniques – Governance of information security

This Recommendation | International Standard provides a framework of information security governance (ISG). Corporate governance requirements place increasing demands on organizations to demonstrate that they have effective internal control arrangements in place. One significant development is the inclusion of information security as part of operational risk in the wider corporate governance definition. Therefore, boards and executive management are increasingly looking for an ISG framework, which will help to achieve the objectives of the organization and meet corporate governance requirements.

The purpose of this Recommendation | International Standard is to promote effective, efficient, and acceptable use of information security activities in organizations by:

assuring stakeholders that, if the Recommendation | International Standard is followed, they can have confidence in the organization’s corporate governance of information security

informing and guiding directors in governing the use of information security activities in their organization, and

providing a basis for objective evaluation of the corporate governance of information security.

- 16 -

The use of this Recommendation | International Standard will provide board of directors and management with the methodology to monitor and control (govern) the information security management system (ISMS) activities in order to meet the internal and external security requirements. Since many organizations need to establish and demonstrate the appropriate information security readiness to the various stakeholders, the governance concepts and implementation models proposed in this Recommendation | International Standard can support the process of directing and controlling the existing ISMS processes and controls.

The framework consists of objectives, principles, focus areas of ISG and it shows how the ISG is related with ISMS. The framework needs to be supported by successful ISMS.

X.mgv6, Security management guideline for implementation of IPv6 environment in telecommunications organizations

This Recommendation provides a set of information security management guides for telecommunications organizations to develop and implement IPv6 telecommunication environment. The Recommendation focuses on network facilities for telecommunications organizations, the necessary security controls and implementation guidance for IPv6 implementation as an extension of Recommendation ITU-T X.1051.

X.rmsm, Information security management reference model for small and medium telecommunication organizations

This Recommendation provides the information security management reference model for small and medium-sized telecommunication organizations (SMTOs). The reference model is developed by analyzing and classifying IT services, identifying IT service types and recommending security controls for each IT service type in the SMTOs perspective. The reference model in this Recommendation will be beneficially applied to SMTOs in their development of information security management.

This Recommendation will allow SMTOs to meet baseline information security management requirements of confidentiality, integrity, availability and any other relevant security property based on the reference model.

X.sgsm, Information security management guidelines for small and medium-sized telecommunication organizations

This Recommendation provides guidelines for establishing and operating information security management for small and medium-sized telecommunication organizations (SMTOs) in the telecommunication industry.

It covers some of necessary security controls from ITU-T X.1051 | ISO/IEC 27011 for information security management in the considering context of small and medium telecommunication organizations without huge cost and human resources to implement its information security management system.

Question 4/17 – Cybersecurity

X.1211 (X.tb-ucc), Usability of network traceback

This Recommendation provides an overview of traceback for responsive measures to certain network issues within a single or a more complex array of service providers. Traceback may assist in discovering ingress points, paths, partial paths or sources of problematic network events. This information may aid service providers in mitigating such events.

- 17 -

X.1570 (X.cybex-disc), Discovery mechanisms in the exchange of cybersecurity informationThis Recommendation provides a framework for discovering cybersecurity information and the mechanism that enables this. Discovery can be seen as a stage of cybersecurity information lifecycle adjacent to information publishing and acquisition, which are integral and necessary stages for discovery. Thus the framework covers how to publish cybersecurity information, obtain the candidate list, and acquire the needed information. A discovery scheme may be implemented with arbitrary mechanisms so long as it complies with the framework, and among these mechanisms are object identifier (OID)-based and Resource Description Framework (RDF)-based discovery, which are also elaborated in this Recommendation.

X.abnot, Abnormal traffic detection and control guideline for telecommunication network

This Recommendation defines the abnormal traffic protection scenarios, detection technologies, controlling measures and products deployment solutions for a telecommunication network. The aim is to provide a comprehensive guideline to monitor and control the abnormal traffic for telecommunication operators.

X.arf, Assessment result format

This Recommendation is a standardized IT asset assessment result format (ARF) that facilitates the exchange of assessment results among systems to increase tool interoperability and allow for the aggregation of those results across large enterprises that utilize diverse technologies to detect patch levels, policy compliance, vulnerability, asset inventory, and other tasks. ARF leverages existing standardization efforts for common names and naming schemes to report the findings for assets.

X.bots, Centralized framework for Botnet detection and response

This Recommendation provides frameworks for botnet detection and response. The Recommendation provides a definition, composition characteristics and behavior models of botnet. Also, it specifies various types of attack threat caused by botnet. And, the Recommendation provides considerations required for botnet detection and response, defines functions and interfaces used in framework for botnet detection and response.

X.capec, Common attack pattern enumeration and classification

This Recommendation on common attack pattern enumeration and classification (CAPEC) is an XML/XSD based specification for the identification, description, and enumeration of attack patterns. Attack patterns are a powerful mechanism to capture and communicate the attacker’s perspective. They are descriptions of common methods for exploiting software. They derive from the concept of design patterns applied in a destructive rather than constructive context and are generated from in-depth analysis of specific real-world exploit examples. The objective of CAPEC is to provide a publicly available catalog of attack patterns along with a comprehensive schema and classification taxonomy.

X.cce, Common configuration enumeration

This Recommendation on common configuration enumeration (CCE) is a specification of configuration guidance statements and configuration controls to facilitate fast and accurate correlation of configuration statements present in disparate domains. A "configuration guidance statement" specifies a preferred or required setting or policy for a computer system. Configuration statements can be found in a variety of repositories such as security guides, benchmarks, vendor guidance and documentation, configuration assessment and management tools, and consolidated reporting systems. The objective of CCE is to provide a means for improving configuration management work processes by allowing people to quickly and accurately correlate configuration data across multiple information sources and tools.

- 18 -

X.cee, Common event expression

This Recommendation on common event expression (CEE) standardizes the way computer events are described, logged, and exchanged. By using CEE’s common language and syntax, enterprise-wide log management, correlation, aggregation, auditing, and incident handling can be performed more efficiently and produce better results.

The primary goal of the effort is to standardize the representation and exchange of logs from electronic systems. CEE breaks the recording and exchanging of logs into four (4) components: the event taxonomy, log syntax, log transport, and logging recommendations.

X.cpe, Common platform enumeration

One of the core platforms included as part of CYBEX’s event/incident/heuristics exchange cluster, is an XML/XSD based specification for structured naming for ICT platforms (hardware, operating systems, and applications). It is based on the generic syntax for Uniform Resource Identifiers. This Recommendation on common platform enumeration (CPE) includes the naming syntax and conventions for constructing CPE names from product information, a dictionary (and associated XML schema) that holds a collection of all known CPE names as well as a binding of descriptive and diagnostic information, a language for creating complex platform descriptions, and a matching algorithm.

Using a clear and uniform naming specification, community members will be able to generate names for new ICT platforms in a consistent and predictable way.

As many sources and examples as possible are leveraged from the CPE community and other interested parties, to develop the specific and succinct definitions of the CPE dictionary elements and classification tree structures.

X.csi, Guidelines for cybersecurity index

This Recommendation provides a guideline to assist in the development, selection, and implementation of the measures or indicators that are basis to compute the cybersecurity index (CSI). To meet this objective, this Recommendation provides a list of potential indicators and describes a methodology used in computing the CSI from indicators on its different steps.

X.csmc, Continuous security monitoring using CYBEX techniques

This Recommendation describes CYBEX techniques for continuous security monitoring capability. Continuous monitoring is ongoing observance with intent to provide warning. A continuous monitoring capability is the ongoing observance, analysis and management to provide decision support regarding situational awareness and deviations from expectations.

X.cwe, Common weakness enumeration

This Recommendation on common weakness enumeration (CWE) provides a structured means to exchange information security weaknesses that are publicly known. CWE provides for a structured list of these information security weaknesses together with associated names. The goal of CWE is to enable more effective discussion, description, selection, and use of software security tools and services that can find these weaknesses in source code and operational systems as well as better understanding and management of software weaknesses related to architecture and design.

X.cwss, Common weakness scoring system

This Recommendation on common weakness scoring system (CWSS) provides an open framework for communicating the characteristics and impacts of IT weaknesses. The goal of CWSS is to enable IT managers, weakness bulletin providers, security vendors, application vendors and researchers to speak from a common language of scoring IT weaknesses.

- 19 -

Without CWSS, IT management must identify and assess weaknesses across many disparate hardware and software platforms. They then need to prioritize these weaknesses and remediate those that pose the greatest risk. When there are so many to fix, with each being scored using different scales, IT managers are left to their own methodologies to find some way of comparing disparate weaknesses and translating them into actionable information.

Because CWSS standardizes the approach for characterizing weaknesses, users of CWSS can invoke temporal and environmental metrics to apply contextual information that more accurately reflects the risk to their unique environment. This allows them to make more informed decisions when trying to mitigate risks posed by vendor agnostic weaknesses within their unique environment.

X.cybex.1, Procedures for the registration of arcs under the object identifier (OID) arc for cybersecurity information exchange

This Recommendation provides for the registration of OID arcs which enable coherent, unique and global identification of cybersecurity information as well as of organizations exchanging that information and associated policies. This Recommendation specifies the information and justification to be provided when requesting an OID for cybersecurity information exchange purposes, and the procedures for the operation of the Registration Authority.

X.cybex-beep, A BEEP profile for cybersecurity information exchange framework

This Recommendation specifies a BEEP profile for use within cybersecurity information exchange techniques (CYBEX). It utilizes BEEP, a generic application protocol kernel for connection-oriented, asynchronous interactions described in IETF RFC 3080. At BEEP's core is a framing mechanism that permits simultaneous and independent exchanges of messages between peers. All exchanges occur in the context of a channel - a binding to a well-defined aspect of the application, such as transport security, user authentication, or data exchange. Each channel has an associated "profile" that defines the syntax and semantics of the messages exchanged.

X.cybex-tp, Transport protocols supporting cybersecurity information exchange

This Recommendation provides an overview of exchange protocols which have been adopted and/ or adapted for use within the cybersecurity information exchange techniques.

X.cyiql, Cybersecurity information query language

This Recommendation on cybersecurity information query Language (CYIQL) defines a flexible data representation that provides a framework for requesting information commonly exchanged by computer incident response teams (CIRTs) about computer security incidents. This specification describes the information model for CYIQL and provides an associated data model specified with XML schema.

X.dexf, Digital forensics exchange format

The digital forensics exchange format (DEXF) is a structured means to exchange digital forensics data between agencies, companies, or countries. The main purpose of digital forensics exchange format is interoperability of digital forensics data.

X.eipwa, Exchange of information for preventing web-based attacks

This Recommendation describes the guideline on techniques for preventing the web-based attacks. It describes the use scenarios for distributing malwares through the web, the functional capabilities, functional architecture for preventing web-based attacks.

- 20 -

X.gpn, Mechanism and procedure for distributing policies for network security

Based on the network security information policy model and network security policy framework defined in ITU-T Recommendation X.1036, this Recommendation further defines the detailed distribution mechanism and distribution procedure of security policy, so that the security policies can be negotiated and distributed between different devices and between the device and the policy center.

X.iodef, Incident object description exchange format

Organizations require help from other parties to mitigate malicious activity targeting their network and to gain insight into potential threats. This coordination might entail working with an ISP to filter attack traffic, contacting a remote site to take down a bot- network, or sharing watch-lists of known malicious IP addresses in a consortium.

The incident object description exchange format (IODEF) is a format for representing computer security information commonly exchanged between computer security incident response teams (CSIRTs). It provides an XML representation for conveying incident information across administrative domains between parties that have an operational responsibility of remediation or a watch-and-warning over a defined constituency. The data model encodes information about hosts, networks, and the services running on these systems; attack methodology and associated forensic evidence; impact of the activity; and limited approaches for documenting workflow.

The overriding purpose of the IODEF is to enhance the operational capabilities of CSIRTs. Community adoption of the IODEF provides an improved ability to resolve incidents and convey situational awareness by simplifying collaboration and data sharing. This structured format provided by the IODEF allows for:

• increased automation in processing of incident data, since the resources of security analysts to parse free-form textual documents will be reduced;

• decreased effort in normalizing similar data (even when highly structured) from different sources; and

• a common format on which to build interoperable tools for incident handling and subsequent analysis, specifically when data comes from multiple constituencies.

X.maec, Malware attribute enumeration and classification

This Recommendation on malware attribute enumeration and classification (MAEC) is an XML/XSD based specification for characterizing malware based on its behaviors, artifacts, and attack patterns. This will allow for the description and identification of malware based on distinct patterns of attributes rather than a single metadata entity (which is the method commonly employed in signature-based detection). MAEC’s focus on structured, attribute-based characterization provides several capabilities that the aforementioned methods do not possess. These capabilities stem from MAEC’s existence as a domain-specific language, with an encompassing and unambiguous vocabulary and grammar.

MAEC aims to: 1) improve human-to-human, human-to-tool, tool-to-tool, and tool-to-human communication about malware, 2) reduce potential duplication of malware analysis efforts by researchers, and 3) allow for the faster development of countermeasures by enabling the ability to leverage responses to previously observed malware instances. Threat analysis, intrusion detection, and incident management are processes that deal with all manners of cyber threats. MAEC, through its uniform encoding of malware attributes, provides a standardized format for the incorporation of actionable information regarding malware in these processes.

- 21 -

MAEC is part of and interoperable with other capabilities of the cybersecurity information exchange framework (CYBEX) described in Recommendation ITU-T X.1500.

The MAEC language includes enumerations of malware attributes and behavior that provide a common vocabulary. These enumerations are at different levels of abstraction: low-level observables, mid-level behaviors and high-level taxonomies. The initial version of MAEC focuses on the creation of the enumeration of low-level malware attributes, and leverages the few instances of similar work already done in this area, such as the common malware enumeration (CME) profile and other information. See http://cme.mitre.org/. Thus it will initially be capable of characterizing the most common malware types, including Trojans, worms, and rootkits, but will ultimately be applicable to more esoteric malware types.

X.oval, Open vulnerability and assessment language

This Recommendation on open vulnerability and assessment language (OVAL) promotes open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, and an assortment of content repositories held throughout the community. The language standardizes the three main steps of the assessment process: representing configuration information of systems for testing; analyzing the system for the presence of the specified machine state (vulnerability, configuration, patch state, etc.); and reporting the results of this assessment. The repositories are collections of publicly available and open content that utilize the language.

X.pfam, Misuse enumeration and characterization

This Recommendation extends the incident object description exchange format (IODEF) defined in IETF RFC 5070 to support the reporting of misuse incidents. These extensions are flexible enough to support information gleaned from activities throughout the entire intrusion detection cycle where authorized users of the systems attempt to gain additional privileges for which they are not authorized, and authorized users who misuse the privileges given them. See USA NIST SP800-94. Both simple reporting and complete forensic reporting are possible, as is consolidating multiple incidents.

This Recommendation does not impose obligations for information exchange nor does it contain a means of classification and analysis of information exchanged.

X.rid, Real-time inter-network defense

This Recommendation on real-time inter-network defense (RID) outlines a proactive inter-network communication method to facilitate sharing incident handling data while integrating existing detection, tracing, source identification, and mitigation mechanisms for a complete incident handling solution. RID provides a secure method to communicate incident information, enabling the exchange of incident object description and exchange format (IODEF) extensible markup language (XML) documents. RID considers security, policy, and privacy issues related to the exchange of potentially sensitive information, enabling service providers or organizations the options to make appropriate decisions according to their policies.

X.ridt, Transport of real-time inter-network defense (RID) messages

The incident object description exchange format (IODEF) defines a common XML format for document exchange, and real-time inter-network defense (RID) defines extensions to IODEF intended for the cooperative handling of security incidents within consortia of network operators and enterprises. This Recommendation specifies a transport protocol for RID based upon the passing of RID messages over HTTP/TLS (transport layer security).

- 22 -

X.sip-cyber, Security guideline for countering cyber attacks on SIP-based services

This Recommendation provides a guideline to specify the SIP-based services, its vulnerability and countermeasures that are basis to enhancing secure SIP-based services. To meet this objective, this Recommendation describes a list of potential wired and wireless SIP-based services and its vulnerability. On each services, security guideline for countering cyber attack on SIP-based services are specified to providing security on those services and provides security requirements more details on each services.

X.sips, Framework for countering cyber attacks in SIP-based services

This Recommendation provides a framework for countering cyber attacks in SIP-based services. The Recommendation provides analysis of SIP-based attacks and characteristics of detection and response in SIP-based services. Also, it provides requirements for information sharing between service providers.

X.sisnego, Framework of security information sharing negotiation

This Recommendation provides a framework of security information sharing negotiation for cybersecurity information exchange contract between cybersecurity entities.

Scope of the negotiation framework is as follows:

Functional requirements and reference model for security information sharing negotiation,

Conceptual data modelling of Security information Sharing Agreement (SSA) and Security information Sharing Policy (SSP),

SSA negotiation process.

X.ssaf, Security standards availability framework

Trusted availability of standards and their derivative objects is essential in bringing about substantial improvements in global cyber/ICT security. This requirement can be met using a common framework for security standards and objects that is described in this Recommendation. This global generic framework, which is modeled after the ITU’s current “best of breed” security standards availability, is described for implementation by other standards bodies worldwide.

This framework includes:

1) Persistent, discoverable URLs for all versions of a standard

2) Open public availability using a simple, well-defined query-response interface supporting http for immediately obtaining

a. the standard and its versions in commonly-used formats

b. schema or modules associated with the standard

c. identifiers and associated information registered as a result of the standard, unless privileged by law or industry custom precludes public availability

3) Host assurance and SSL/TLS access using extended validation certificates.

X.trm, Overview of traceback mechanisms

This Recommendation describes various types of traceback mechanisms. This Recommendation also derives the evaluation criteria for comparing the traceback mechanisms.

- 23 -

X.xccdf, Extensible configuration checklist description format

This Recommendation specifies the data model and Extensible Markup Language (XML) representation for the extensible configuration checklist description format (XCCDF). An XCCDF document is a structured collection of security configuration rules for some set of target systems. The XCCDF specification is designed to support information interchange, document generation, organizational and situational tailoring, automated compliance testing, and compliance scoring. The specification also defines a data model and format for storing results of security guidance or checklist compliance testing. The intent of XCCDF is to provide a uniform foundation for expression of security checklists and other configuration guidance, and thereby foster more widespread application of good security practices.

Supplement to Recommendation ITU-T X.1205 (X.gopw), Supplement on guidelines for reducing malware in ICT networks

This supplement provides guidelines for reducing malware in ICT networks. These guidelines can be utilized by end users for reducing malware in ICT networks.

Question 5/17 – Countering spam by technical means

X.1246 (X.tcs-2), Real-time blocking list (RBL)-based framework for countering VoIP spam

This Recommendation provides an RBL-based technical framework for countering VoIP spam, which consists of four functional entities: VoIP spam prevention system (VSPS), VoIP spam prevention policy server (VSPPS), RBL central system for VoIP spam prevention (VSP-RBL), and user reputation system (URS). This Recommendation also specifies the functionalities, procedures, and interfaces of each functional entity for countering VoIP spam.

X.ics, Functions & interfaces for countering email spam using botnet information

This Recommendation specifies the general architecture for countering email spam sent by botnet, then gives functions and interfaces in this architecture. Moreover, this Recommendation keeps accordance with the interactive gateway for countering spam defined in Recommendation ITU-T X.1243.

X.oacms, Overall aspects of countering mobile messaging spam

This Recommendation provides the overview of mobile messaging spam, including types, characteristics, delivery method and approaches. This Recommendation also introduces current technologies and mechanism, relative works and activities in different organizations on countering mobile message spam. However, this Recommendation only focuses on mobile messaging spam including short message service (SMS) spam and multimedia messaging service (MMS) spam.

WORKING PARTY 2/17 - APPLICATION SECURITY

Question 6/17 - Security aspects of ubiquitous telecommunication services

X.iptvsec-2, Functional requirements and mechanisms for secure transcodable scheme of IPTV

This Recommendation addresses functional requirements, architecture, and mechanisms that pertain to security of transcoding protected IPTV content. Generic security of IPTV content is not discussed in this Recommendation.

X.iptvsec-3, Key management framework for secure IPTV services

This Recommendation describes requirements and architecture for the key management including a key hierarchy for unicast and multicast IPTV services in the IPTV context. This Recommendation also specifies a key management for downloadable SCP, if a downloadable SCP is deployed.

- 24 -

X.iptvsec-4, Algorithm selection scheme for service and content protection (SCP) descrambling

This Recommendation develops a set of algorithm selection functions from existing descrambling algorithms to share terminal devices between service providers and security providers. This includes algorithm selection scheme, signalling for the selection and interoperability issues.

X.iptvsec-6, Framework for the downloadable service and content protection (SCP) system in the mobile IPTV environment

The Recommendation provides a framework for the downloadable service and content protection (SCP) scheme in the mobile IPTV environment. It also describes functional architecture and requirement for the downloadable SCP scheme for roaming in the mobile IPTV environment.

X.iptvsec-7, Guideline for selecting cryptographic algorithms for IPTV service and content protection (SCP)

The Recommendation provides a guideline on criteria for selecting cryptographic algorithms for IPTV service and content protection (SCP). In addition, it provides a list of cryptographic algorithms including encryption, message authentication and integrity, and key derivation for IPTV SCP service.

X.iptvsec-8, Virtual machine-based security platform for renewable IPTV service and content protection (SCP)

This Recommendation develops a set of renewability functions for virtual machine-based SCP security platform. This includes virtual machine architecture and how to organized virtual machine related components such as SCP client, terminal client (embedded SCP) and media client. It does not deal with the service and content protection system itself.

X.msec-5, Security requirements and mechanism for reconfiguration of mobile device with multiple communication interfaces

This Recommendation describes security requirements and mechanism for reconfiguration of mobile device with multiple communication interfaces. The security aspects for mobile users, terminal devices, and communication services with multiple communication interfaces should be investigated. The Recommendation specifies security threats, followed by the description of security requirements. And it provides appropriate countermeasures including security reconfiguration mechanism.

X.msec-6, Security aspects of mobile phones

This Recommendation indicates the main security threats to mobile phones, specifies the security requirements for mobile phones and proposes the security technologies and mechanisms for mobile phones. In addition, it provides a general security evaluation framework for mobile phones.

X.unsec-1, Security requirements and framework of ubiquitous networking

This Recommendation describes an overview of ubiquitous networking. It also describes the security threats and security requirements of ubiquitous networking. Security framework and functions that pertain to security of ubiquitous networking are provides in this Recommendation.

X.usnsec-3, Secure routing mechanisms for wireless sensor network

This Recommendation provides secure routing mechanisms for wireless sensor network in ubiquitous sensor network. It introduces general network topologies and routing protocols in ubiquitous sensor network. It describes security threats of wireless sensor network and provides countermeasures for secure routing in wireless sensor network.

- 25 -

Question 7/17 - Secure application services

X.1141, Amd.1, Security Assertion Markup Language (SAML 2.0) - Amendment 1: Errata

This Amendment amends ITU-T X.1141 to reflect the official errata that have been approved by OASIS regarding the OASIS SAML 2.0 version.

X.1142, Amd.1, eXtensible Access Control Markup Language (XACML 2.0) – Amendment 1: Errata

This Amendment amends ITU-T X.1142 to reflect the official errata that have been approved by OASIS regarding the OASIS XACML 2.0 version.

X.p2p-3, Security requirements and mechanisms of peer-to-peer-based telecommunication network

This Recommendation analyzes the special security requirements in the peer-to-peer (P2P)-based telecommunication environment, designs the security technical framework for the new P2P-based telecom network architecture and service scenarios, and defines the security solutions and detailed mechanisms to assure the network and services security.

X.p2p-4, Use of service providers’ user authentication infrastructure to implement PKI for peer-to-peer networks

This Recommendation describes the mechanisms for utilizing service providers’ user authentication infrastructure to implement Public Key Infrastructure (PKI) used for securing peer-to-peer (P2P) networks. The described mechanisms allow a peer in P2P networks to verify a public key certificates of a corresponding peer that are issued by its owner (user), not by a well-known certificate authority.

X.sap-4, The general framework of combined authentication on multiple identity service provider environment

This Recommendation provides the general framework of combined authentication on multiple identity service provider environment for service provider to achieve combined authentication like multi-factor authentication. The framework in this Recommendation describes models, basic operations and security requirements against each model components and each messages between model components to keep the total assurance of authentication in case of the combination of multiple service providers. In addition, the framework also describes models, basic operations and security requirements to support the authentication service that manages combination of multiple service providers.

X.sap-5, Guideline on anonymous authentication for e-commerce service

This Recommendation develops an anonymous authentication guideline and reference model for e-commerce because anonymous authentication can be used for providing privacy-preserving technology. This Recommendation describes privacy threats and security requirements for privacy enhanced e-commerce service. It also describes security functions that satisfy the security requirements and anonymous authentication reference models for e-commerce.

- 26 -

X.sap-6, One time password based non-repudiation framework

This Recommendation provides a non-repudiation framework based on one time password (OTP) to provide trust mechanisms between transaction entities. Also, this Recommendation describes the security requirements of OTP-based non-repudiation service as well as mechanisms for generating non-repudiation token. The sender may request TTP to generate the non-repudiation token of origin for the sender and also the recipient may request to verify the token of delivery for the recipient. Also, the TTP may generate the non-repudiation token of delivery for the recipient and verifies the token for the sender.

X.websec-4, Security framework for enhanced web based telecommunication services

This Recommendation provides a security framework for enhanced web based telecommunication services. This Recommendation describes security threats and security requirements of the enhanced web based telecommunication services, and it also describes security functions and technologies that satisfy the security requirements.

X.xacml3, eXtensible Access Control Markup Language (XACML) 3.0

This Recommendation defines core XACML including syntax of the language, models, context with policy language model, syntax and processing rules. This Recommendation specifies XACML core and hierarchical role based access control profile. A multiple resource profile of XACML and a SAML 2.0 profile of XACML are specified. To improve on the security of exchanging XACML based policies, this Recommendation also specifies an XACML XML digital signature profile for securing data. A privacy profile is specified in order to provide guidelines for implementers. This Recommendation is technically equivalent and compatible with the OASIS XACML 3.0 standard.

Question 8/17 – Service oriented architecture security

X.ccsec, Security guideline for cloud computing in telecommunication area

This Recommendation analyzes security challenges for cloud computing in telecommunication area, and describes some security considerations for cloud computing service providers and consumers as a guidance to help them deploy cloud computing services as well as choose cloud computing services.

X.fsspvn, Framework of the secure service platform for virtual network

This Recommendation defines the framework of service platform for virtual network (SPVN), which aims to establishing and managing virtual network. The service platform provides the functions of network connectivity (e.g. NAT transversal), security service (e.g. identity management in virtual network) and network management (e.g. security policy distribution, group management in virtual network). This Recommendation also describes the key technologies used in the service platform and the interfaces between the service platform and applications.X.sfcse, Security functional requirements for Software as a Service (SaaS) application environment

This Recommendation provides a generic functional description for secure service oriented Software as a Service (SaaS) application environment that is independent of network types, operating system, middleware, vendor specific products or solutions. In addition, this Recommendation is independent of any service or scenarios specific model (e.g., web services, Parlay X or REST), assumptions or solutions. This Recommendation aims to describe a structured approach for defining, designing, and implementing secure and manageable service oriented SaaS application environment capabilities in telecommunication cloud computing environment.

- 27 -

X.srfcts, Security requirements and framework of cloud based telecommunication service environment

This Recommendation describes both general and specific security requirements of cloud based telecommunication services that include service creation, service integration, service delivery, data storage and key management etc. This Recommendation also aims to describe the security framework with integration of various security functions that can provide differentiated security levels for various cloud based services.

Question 9/17 - Telebiometrics

X.1081 Amendment 3, The telebiometric multimodal model – A framework for the specification of security and safety aspects of telebiometrics - Amendment 3: Enhancement to support a new modality “ELECTRO” and define new object identifiers

This Amendment adds a seventh modality, "ELECTRO", which is used in the future Recommendation X.th2 (Telebiometrics related to physics). It also assigns new object identifiers for quantities which will be defined in parts 2 to 6 of the X.th series.

X.1086, Amd. 1, Telebiometric protection procedures - A guideline to technical and managerial countermeasures for biometric data security - Amendment 1: Multibiometric protection procedures

This Amendment updates ITU-T Recommendation X.1086 to incorporate multiple biometrics information in telebiometric protection procedures by modifying Summary, Keywords, Scope, References, Definitions, Abbreviations and Acronyms, and Bibliography.

The Amendment defines new vulnerabilities and protection guidelines in four different fusion levels, sample-level, feature-level, score-level, and decision-level, for multibiometric systems.

The Amendment adds Appendix V to describe applicable techniques for multibiometris data protection.

X.1090 (X.ott), Authentication framework with one-time telebiometric template

This Recommendation describes a user authentication framework with a one-time telebiometric template. The framework provides secure user authentication and protection mechanisms for a biometric template transmitted over open networks. It prevents a replay attack and protects an original biometric template by generating a new template upon each completion of authentication. This Recommendation also addresses the security requirements associated with the framework for a one-time telebiometric template.

X.bhsm, Telebiometric authentication framework using biometric hardware security module

This Recommendation describes a framework and specifies requirements for a telebiometric authentication using biometric hardware security module (HSM). The Recommendation provides a definition of the biometric HSM and describes how it should be operated for secure telebiometric authentication using biometric HSM. The framework focuses on official guidance of how to employ various security mechanisms to prevent various attacks and assure telebiometric authentication with biometric HSM. It further provides proper application models required when telebiometric authentication and X.509 certificate based PKI are combined to prove the owner of a private key associated to an X.509 certificate.

X.gep, A guideline for evaluating telebiometric template protection techniques

This Recommendation describes a general guideline for testing and reporting the performance of biometric template protection techniques based on biometric cryptosystem and cancelable biometrics, as the targets of evaluation. This guideline specifies two reference models for evaluation

- 28 -

which uses biometric template protection techniques in telebiometrics system. Then, it defines the metrics, procedures, and requirements for testing and evaluating the performance of the biometric template protection techniques.

X.th1, e-Health and world-wide telemedicines – Generic telecommunication protocol

This Recommendation is designed to provide wide-area communication in support of health-related activities, where the communication can usefully be undertaken as structured messages. It aims to remove the need for medical staff and patients to be co-located, and supports both multi-party (for audit and training purposes) as well as one-to-one interactions. It recognizes that in many cases interactions between medical staff and patients need to be supplemented by unstructured voice and/or video communication, which may need synchronization with the structured message flows.

There are many standards development groups involved in health-care, including standardization of various aspects of medical and dental and DNA records. This Recommendation recognizes and identifies their defined data formats and interactions using ASN.1 object identifiers (OIDs). It aims to support "world-wide medicines". This is intended to include not only Western medicine and drugs, but also alternative therapies, including herbal remedies and interventions such as acupuncture. This Recommendation specifies complete protocols (including a service discovery protocol) using TCP/IP and SOAP/HTTP, with bindings similar to those specified in ITU-T X.1083 | ISO/IEC 24708. Security features are provided using ITU-T X.509 | ISO/IEC 9594-8 and its derivatives.

The communications require the identification of a variety of objects ranging from medical practitioners, medical and dental record formats, to drugs and surgical intervention procedures. It also requires identification of physiological quantities and units. This Recommendation specifies ASN.1 Information Object Classes for the identification of these objects, and other parts of this series of Recommendations provide the Internationalized Object Identifiers to identify objects in these classes. The other five parts (covering the fields of physics, chemistry, biology, culturology and psychology) provide the associated Information Object definitions and assign OIDs for both quantities and units and other objects associated with the fields of study.

X.th2, Telebiometrics related to physics

This Recommendation specifies two aspects of telebiometrics related to safety, security, privacy and anonymity. One is the set of messages, with authentication and integrity and privacy (specified using ASN.1) that provide the telebiometric communications between an operator and a remote telemedicine device. The other is the tables of physiological quantities and units and their thresholds that define the thresholds for safety of a human being when various sensors or actions are being applied to the human body. This Recommendation uses the framework defined in ITU-T X.1081 for optimal safety and security in telebiometrics.

It is applicable to both physics and biometrics (the measurement of physiological, biological, and behavioral characteristics limited to the field of physics). A taxonomy of wetware and hardware/software interactions is defined. Thresholds are specified using the set of International System of Quantities (ISQ) and the related International System of Units (SI).

X.th3, Telebiometrics related to chemistry

This Recommendation specifies two aspects of telebiometrics related to safety, security, privacy and anonymity. One is the set of messages, with authentication and integrity and privacy (specified using ASN.1) that provide the telebiometric communications between an operator and a remote telemedicine device. The other is the tables of physiological quantities and units and their thresholds that define the thresholds for safety of a human being when various sensors or actions are

- 29 -

being applied to the human body. This Recommendation uses the framework defined in ITU-T X.1081 for optimal safety and security in telebiometrics.

It is applicable to both chemistry and biometrics (the measurement of physiological, biological, and behavioral characteristics to the field of chemistry). A taxonomy of wetware and hardware/software interactions is defined. Thresholds are specified using the set of International System of Quantities (ISQ) and the related International System of Units (SI).

X.th4, Telebiometrics related to biology

This Recommendation specifies two aspects of telebiometrics related to safety, security, privacy and anonymity. One is the set of messages, with authentication and integrity and privacy (specified using ASN.1) that provide the telebiometric communications between an operator and a remote telemedicine device. The other is the tables of physiological quantities and units and their thresholds that define the thresholds for safety of a human being when various sensors or actions are being applied to the human body. This Recommendation uses the framework defined in ITU-T X.1081 for optimal safety and security in telebiometrics.

It is applicable to both biology and biometrics (the measurement of physiological, biological, and behavioral characteristics to the field of biology). A taxonomy of wetware and hardware/software interactions is defined. Thresholds are specified using the set of International System of Quantities (ISQ) and the related International System of Units (SI).

X.th5, Telebiometrics related to culturology

This Recommendation specifies two aspects of telebiometrics related to safety, security, privacy and anonymity. One is the set of messages, with authentication and integrity and privacy (specified using ASN.1) that provide the telebiometric communications between an operator and a remote telemedicine device. The other is the tables of physiological quantities and units and their thresholds that define the thresholds for safety of a human being when various sensors or actions are being applied to the human body. This Recommendation uses the framework defined in ITU-T X.1081 for optimal safety and security in telebiometrics.

It is applicable to both culturology and biometrics (the measurement of physiological, biological, and behavioral characteristics to the field of culturology). A taxonomy of wetware and hardware/software interactions is defined. Thresholds are specified using the set of International System of Quantities (ISQ) and the related International System of Units (SI).

X.th6, Telebiometrics related to psychology

This Recommendation specifies two aspects of telebiometrics related to safety, security, privacy and anonymity. One is the set of messages, with authentication and integrity and privacy (specified using ASN.1) that provide the telebiometric communications between an operator and a remote telemedicine device. The other is the tables of physiological quantities and units and their thresholds that define the thresholds for safety of a human being when various sensors or actions are being applied to the human body. This Recommendation uses the framework defined in ITU-T X.1081 for optimal safety and security in telebiometrics.

It is applicable to both psychology and biometrics (the measurement of physiological, biological, and behavioral characteristics to the field of psychology). A taxonomy of wetware and hardware/software interactions is defined. Thresholds are specified using the set of International System of Quantities (ISQ) and the related International System of Units (SI).

- 30 -

X.tif, Integrated framework for telebiometric data protection in e-health and worldwide telemedicines

This Recommendation provides an integrated framework for protecting biometric data and private information protection in e-health and worldwide telemedicines. It defines a model of health services using telebiometrics for user identification and authentication. It identifies the threats in transmitting various sensory data related to human health and provides their countermeasures for secure transmission.

WORKING PARTY 3/17 - IDENTITY MANAGEMENT AND LANGUAGES

Question 10/17 - Identity management architecture and mechanisms

X.1253 (X.idmsg), Security guidelines for identity management systems

This Recommendation proposes security guidelines for identity management (IdM) systems. The security guidelines provide how an IdM system should be deployed and operated for secure identity services in NGN (Next Generation Network) or cyberspace environment. The security guidelines focus on providing official advice how to employ various security mechanisms to protect a general IdM system and it also provides proper security procedures required when two IdM systems are interoperated.

X.1261 (X.EVcert), Extended validation certificate framework (EVcert)

This Recommendation covers the extended validation certificate framework and is an integrated combination of technologies, protocols, identity proofing, lifecycle management, and auditing practices that describe the minimum requirements that must be met in order to issue and maintain extended validation certificates (“EV certificates”) concerning an organization. Subject organization information from valid EV certificates can then be displayed in a special manner by certain relying-party software applications (e.g., browser software) in order to provide users with a trustworthy confirmation of the identity of the entity that controls the website or other services they are accessing. Although initially intended for use in establishing web-based data communication conduits via transport layer security – or secure socket layer (TLS/SSL) protocols, extensions are envisioned for secure / multipurpose Internet mail extensions (S/MIME), time-stamping, voice-over-Internet (VoIP), instant messaging (IM), web services, etc.

The primary purposes of this Recommendation are to: 1) identify the legal entity that controls a web or service site, and 2) enable encrypted communications with that site. The secondary purposes include significantly enhancing cybersecurity by helping establish the legitimacy of an organization claiming to operate a website, and providing a vehicle that can be used to assist in addressing problems related to distributing malware, phishing, identity theft, and diverse forms of online fraud.

X.authi, Authentication integration in identity management

This Recommendation provides a guideline for the telecom operators to implement the authentication integration of the network layer and the service layer, so that a user need not to be re-authenticated again in the service layer if (s)he has been strictly authenticated when accessing the operator's network. This Recommendation analyzes the scenarios in which the authentication integration can be implemented well. It also provides the technical frameworks and solutions for the authentication integration in these scenarios.

X.atag, Attribute aggregation framework

This Recommendation develops a framework for aggregating identity attributes from different identity providers, while identifying the resulting assurance level. The Recommendation also treats a secure attribute exchange under user control.

- 31 -

X.discovery, Discovery of identity management information

This Recommendation enables discovery:

• for relevant information about identifiers, including those utilizing e-mail address syntax and those that are URLs as well as persistent identifiers;

• of attributes about identity providers and relying parties, including, but not limited to visual logos and human-readable site names;

• supporting a spectrum of clients, ranging from passive clients to active clients with bootstrapping functionality;

• of authenticable attributes and add-on functionality of non-browser applications;

• of trust frameworks, policies and references.

X.eaa, Information technology – Security techniques – Entity authentication assurance framework

This Recommendation | International Standard defines four levels of entity authentication assurance (i.e., LoA 1 – LoA 4); and the criteria and threats for each of the four levels of entity authentication assurance. Additionally it:

• specifies a framework for managing the assurance levels;

• based on a risk assessment, provides guidance concerning control technologies that to be used to mitigate authentication threats to authentication;

• provides guidance for mapping the four levels of assurance to other authentication assurance schemas; and

• provides guidance for exchanging the results of authentication that are based on the four levels of assurance.

X.giim, Generic identity management interoperability mechanisms

This Recommendation provides a generic framework for identity management (IdM) that is independent of network types, technology or vendor specific products used to provide solutions, and operating environment taking into consideration the need for large scale flexible and dynamic authentication systems.

X.idmcc, Requirement of IdM in cloud computing

The Recommendation focuses on the harmonization of the telecommunication services in the cloud computing environment. This Recommendation starts from the use-case and requirements analysis in consideration of the existing industry efforts and it concentrates on how to harmonize the telecommunication services and the Internet services based on a common identity management infrastructure in the cloud computing environment.

X.idmgen, Generic identity management framework

This Recommendation provides a generic framework for identity management (IdM) that is independent of network types, technology or vendor specific products used to provide solutions, and operating environment. In addition, this Recommendation is independent of any service or scenarios specific model (e.g., web services, third party or federated models), assumptions or solution specifications. The primary purpose of this framework is to describe a structured approach for designing, defining, and implementing IdM solutions and facilitate interoperability in heterogeneous environments.

- 32 -

This framework is intended to be used as a foundation to develop and specify specific aspects of IdM such as detailed requirements, mechanisms and procedures as needed to facilitate interoperability between different federations, service providers or enterprises (e.g., government or private corporations) using different IdM systems and solutions based on different specifications or technology, and operating under different regulatory rules, policies and conditions.

There are no restrictions imposed on the applicability of this Recommendation. Since the described framework is generic it could be applied or used as appropriate to any specific IdM solution or networking environment such as private or public enterprises (e.g., government or private corporations), next generation network (NGN), managed IP networks.

X.idm-ifa, Framework architecture for interoperable identity management systems

This Recommendation proposes a blueprint for a modular framework architecture for identity management systems. The architecture is expected to serve as a reference while discussing, designing and developing future interoperable identity management (IdM) systems. The architecture is intended to be generic in order to satisfy versatile requirements of user-centric, network-centric and service-centric IdM systems.

In addition, an informative mapping of the architecture on to next generation networks is included.

X.mob-id, Baseline capabilities and mechanisms of identity management (IdM) for mobile applications and environment

This Recommendation specifies baseline capabilities and mechanisms of identity management (IdM) for mobile applications and environment. The capabilities can include user requirements to meet user’s needs and functional aspects for IdM in mobile context. In addition, it specifies mechanisms for IdM in mobile context to be satisfied when an application in mobile environment is developed. It provides a reference framework that can incorporate specified baseline capabilities of IdM to be used in mobile applications and environment. The mechanisms specify mobile identity management and security to provide core mobile identity lifecycle management and security mechanisms. It also provides mobile identity operations that can provide functions required to build up secure and personalized mash-up applications in mobile environment.

X.oitf, Open identity trust framework

This Recommendation addresses identity management technologies that reduce the friction of using the Web, much like credit cards reduce the friction of paying for goods and services. However, they also introduce a new problem: who do you trust? In other words, how does a relying party know it can trust credentials from an identity service provider without knowing if that provider’s security, privacy, and operational policies are strong enough to protect the relying party’s interests? A trust framework enables a party who accepts a digital identity credential (called the relying party) to trust the identity, security, and privacy policies of the party who issues the credential (called the identity service provider).

X.priva, Criteria for assessing the level of protection for personally identifiable information in identity management

This Recommendation defines the criteria for assessing the level of protection for personally identifiable information (PII) of the identity provider and the relying party concerned in identity service, depending on the protection for personally identifiable information requested by them to the requesting/asserting party, and the type and use purpose of PII and maintain period of PII, as well as the technical and administrative measures for protection for PII.

- 33 -

Question 11/17 – Directory services, Directory systems, and public-key/attribute certificates

F.5xx, Directory Service - Support of tag-based identification services

This Recommendation provides guidance for providing directory services for tag-based identification applications by reference to the directory capabilities as specified in the ITU-T X.500 Series of Recommendations | ISO/IEC 9594-All Parts and in the Lightweight Directory Access Protocol (LDAP) specifications as developed within Internet Engineering Task Force (IETF). A tag, also called an Automatic Identification and Data Capture (AIDC) media. It holds an identifier that identifies the item to which the AIDC media is affixed or associated. The directory may be used to store information associated with the AIDC media to be accessed using the identifier as the argument in a directory retrieval request.

This Recommendation identifies two cases, one case where the identifier is used as a whole to access a centralized directory, and another case where the structure of the identifier is explored to access distributed directory systems, when it is not feasible for a specific environment to hold all relevant information in a single directory. In this latter situation the top-level information could be held by some type of independent service provider, while the company and/or item related information may held by the information owner.

The primary focus is on radio frequency identification (RFID) tags as specified within the GS1 EPCglobal specifications and within ISO and ISO/IEC International Standards.

Question 12/17 - Abstract Syntax Notation One (ASN.1), Object Identifiers (OIDs) and associated registration

X.660, Information technology – Open Systems Interconnection – Procedures for the operation of OSI Object Identifier Registration Authorities: General procedures and top arcs of the International Object Identifier tree

Recommendation ITU-T X.660 | ISO/IEC 9834-1 defines a tree structure that supports international object identifiers (OIDs). It includes registration of the top-level arcs of the OID tree. It also specifies procedures for the operation of an International Registration Authority for use, when needed, by other ITU-T Recommendations and/or International Standards.

For easy reference, and to emphasize that this tree is an extended form of the original OID tree (defined in earlier versions of this Recommendation | International Standard), this specific tree can be referred to as "the International Object Identifier tree", or more commonly as just "the OID tree".

The original OID tree required all arcs to be unambiguously identified by a primary integer value, with the use for human readability of (not necessarily unambiguous) secondary identifiers (restricted to the Latin alphabet). Secondary identifiers were not normally carried in protocols or used for machine identification. The International Object Identifier tree extends this by allowing an arc to also be unambiguously identified by a Unicode label (a string of Unicode characters) that can be carried in protocols and can be used for machine identification.

The primary integers and secondary identifiers of the International Object Identifier tree continue to be used in encodings (primary integer values only) and value notation (primary integer values and secondary identifiers) of the ASN.1 OBJECT IDENTIFIER type, which is unchanged. The Unicode labels can only be used in encodings and value notation of the ASN.1 OID-IRI type.

It also provides recommendations on an appropriate fee structure for registration of lower level arcs.

- 34 -

Question 13/17 - Formal languages and telecommunication software

Z.100 (revised), Specification and description language: Overview of SDL-2010

This Recommendation is a part of the set of Specification and description language Recommendations for SDL-2010. It provides an overview and common material (such as conventions and tool compliance). It gives concepts for behavior, data description and (particularly for larger systems) structuring. The basis of behavior description is extended finite state machines communicating by messages. Data description is based on data types for values. The basis for structuring is hierarchical decomposition and type hierarchies. A distinctive feature is the graphical representation. SDL-2010 is backwards compatible with previous versions of SDL while adding significant new features.

This Recommendation is revised as part of the restructuring of the ITU-T Z.100 series for SDL-2010.

Z.101, Specification and description language: Basic SDL-2010

This Recommendation is part of the set of Specification and description language Recommendations for SDL-2010. It covers core features such as agent (block, process) type diagrams, agent diagrams for structures with channels, diagrams for extended finite state machines and the associated semantics for these basic features. The language defined by Z.101 includes is called "Basic SDL-2010".

Z.102, Specification and description language: Comprehensive SDL-2010

This Recommendation is part of the set of Specification and description language Recommendations for SDL-2010. It extends the semantics and syntax of the Basic language to cover full abstract grammar and the corresponding canonical concrete notation. This includes features such as continuous signals, enabling conditions, type inheritance, and aggregate states. The language defined by Z.103 includes features defined in Z.101 and is called "Comprehensive SDL-2010".

Z.103, Specification and description language: Shorthand notation and annotation in SDL-2010

This Recommendation is part of the set of Specification and description language Recommendations for SDL-2010. It adds notation shorthand (such as asterisk state) that make the language easier to use and more concise, and various annotations that make models easier to understand (such as comments or create lines), but does not add to the formal semantics of the models. The shorthand notations are transformed from the concrete syntax of ITU-T Z.103 to concrete syntax that is allowed by ITU-T Z.102 or ITU-T Z.101. The language defined by Z.103 includes features defined in Z.101 and Z.102 and is called "Shorthand SDL-2010".

Z.104 (revised), Specification and description language: Data and action language in SDL-2010

This Recommendation is part of the set of specification and description language Recommendations for SDL-2010. It defines the detail of the data and action language used to define data types and expressions. In SDL-2010 it is allowed to use different concrete data notations, such as the SDL-2000 data notation or C with bindings to the abstract grammar and the predefined data package.

This Recommendation is revised to be consistent with the rest of the Z.100 series for SDL-2010. It replaces the data part of ITU-T Z.100 for SDL-2000 and previous ITU-T Z.104 on encoding of data.

- 35 -

Z.105 (revised), Specification and description language: SDL-2010 combined with ASN.1 modules

This Recommendation is part of the set of Specification and description language Recommendations for SDL-2010. It defines how Abstract Syntax Notation One (ASN.1) modules can be used in combination with SDL-2010. The combined use of SDL and ASN.1 permits a coherent way to specify the structure and behavior of telecommunication systems, together with data, messages and encoding of messages that these systems use.

This Recommendation is revised to be consistent with the rest of the ITU-T Z.100 series for SDL-2010, because it references the syntax and semantics of the language in other Recommendations in the series. There are some refinements of this Recommendation based on its use and usefulness, and changes to ASN.1.

Z.106 (revised), Specification and description language: Common interchange format (CIF) for SDL-2010

This Recommendation is part of the set of Specification and description language Recommendations for SDL-2010. The common interchange format (CIF) is intended for the interchange of graphical SDL specifications (SDL-GR) made on different tools that do not use the same storage format.

This Recommendation is revised to be consistent with the rest of the ITU-T Z.100 series for SDL-2010.

Z.109 (revised), Specification and description language: Unified Modeling Language (UML) profile for SDL 2010

This Recommendation is part of the set of Specification and description language Recommendations for SDL-2010. It defines a unified modeling language (UML) profile that maps to SDL-2010 semantics so that UML can be used in combination with SDL. The combined use of SDL-2010 and UML permits a coherent way to specify the structure and behaviour of telecommunication systems, together with data.

This Recommendation is revised to be consistent with the rest of the ITU-T Z.100 series for SDL-2010, because it references the abstract grammar of the language and paragraphs for transformation models in other Recommendations in the series.

Z.120 (revised – 2012), Message sequence chart (MSC)

The purpose of recommending the message sequence chart (MSC) notation is to provide a trace language for the specification and description of the communication behavior of system components and their environment by means of message interchange. Since in MSC diagrams the communication behavior is presented in a very intuitive and transparent manner, particularly in the graphical representation, the MSC language is easy to learn, use and interpret. In connection with other languages it can be used to support methodologies for system specification, design, simulation, testing, and documentation.

This Recommendation is revised to reflect the experience and changes in use of the language since the last major revision of the language (to MSC-2000) in 1999 and the last update in 2004 and maintenance revision in 2010.

Z.151 (revised), User requirements notation (URN) – Language definition

This Recommendation defines the user requirements notation (URN) intended for the elicitation, analysis, specification, and validation of requirements. URN combines modeling concepts and notations for goals (mainly for non-functional requirements and quality attributes) and scenarios (mainly for operational requirements, functional requirements, and performance and architectural

- 36 -

reasoning). The goal sub-notation is called goal-oriented requirements language (GRL) and the scenario sub notation is called use case map (UCM).This Recommendation is revised to consider new language concepts and to reflect the experience and use of the notation since the initial release of the standard for the notation in 2008 (ITU-T Z.151).

Z.uml-msc, Unified modeling language (UML) profile for MSC

This Recommendation defines a unified modeling language (UML) profile that maps UML2 to message sequence chart (ITU-T Z.120) semantics so that UML can be used in combination with MSC. This combined use permits a coherent way to describe message-oriented scenarios for telecommunication systems. This work enables one to use UML2 tools and construct models (e.g., interaction diagrams) that will have the semantics of MSC.

Z.uml-urn-grl, Unified modeling language (UML) profile for URN GRL

This Recommendation defines a unified modeling language (UML) profile that maps UML2 to user requirements notation (URN) semantics for goal requirements, so that UML can be used in combination with goal-oriented requirements language (GRL). This combined use permits a coherent way to describe goal models, complemented with other UML concepts and diagrams. This work enables one to use UML2 tools and construct UML models that will have the semantics of URN.

Z.uml-urn-ucm, Unified modeling language (UML) profile for URN UCM

This Recommendation defines a unified modeling language (UML) profile that maps UML2 to user requirements notation (URN) semantics for use descriptions, so that UML can be used in combination with use case maps (UCM). This combined use permits a coherent way to describe causal scenarios for telecommunication systems, complemented with other UML concepts and diagrams. This work enables one to use UML2 tools and construct UML models that will have the semantics of URN.

Z Suppl.1 (revised), Supplement 1 to Z-series Recommendations – ITU-T Z.100-series – Supplement on methodology on the use of description techniques

This Supplement replaces ITU-T Z.100 Supplement 1 (10/96) and includes a tutorial on the use of unified modeling language (UML) with ITU-T languages. It is intended that the document is suitable for incorporation by the users in their overall methodologies, tailored for their application systems and specific needs. In particular, this Supplement does not detail issues of derivation of an implementation from the specification or the testing of systems. In the case of testing, it is expected that this should be partially covered by a separate document dealing with the generation of tests for standards or products. In the case of product implementation, it is expected that manufacturers will have their own derivation guidelines and methodology.

Z.Imp100 (revised), Specification and description language Implementers’ Guide - Version 2.0.0

This Implementers’ Guide is principally a compilation of reported defects and their resolutions to the Specification and description language ITU-T Recommendations for SDL-2010:

• Z.100, Z.101, Z.102, Z.103, Z.104, Z.105, Z.106, Z.109, Z.111 and Z.119.

It also contains some historical information of the previous set of Z.100-series Recommendations.

- 37 -

Question 14/17 - Testing languages, methodologies and framework

Z.161 (revised), Testing and Test Control Notation version 3: TTCN 3 core language

Recommendation ITU-T Z.161 defines TTCN-3 (Testing and Test Control Notation 3) intended for specification of test suites that are independent of platforms, test methods, protocol layers and protocols. TTCN-3 can be used for specification of all types of reactive system tests over a variety of communication ports. Typical areas of application are protocol testing (including mobile and Internet protocols), service testing (including supplementary services), module testing, testing of CORBA based platforms and APIs. The specification of test suites for physical layer protocols is outside the scope of this Recommendation.

The core language of TTCN-3 can be expressed in a variety of presentation formats. While this Recommendation defines the core language, Recommendation ITU-T Z.162 defines the tabular format for TTCN (TFT) and Recommendation ITU-T Z.163 defines the graphical format for TTCN (GFT). The specification of these formats is outside the scope of this Recommendation. The core language serves three purposes:

1) as a generalized text-based test language;

2) as a standardized interchange format of TTCN test suites between TTCN tools;

3) as the semantic basis (and where relevant, the syntactical basis) for the various presentation formats.

The core language may be used independently of the presentation formats. However, neither the tabular format nor the graphical format can be used without the core language. Use and implementation of these presentation formats shall be done on the basis of the core language.

Z.164 (revised), Testing and Test Control Notation version 3: TTCN-3 operational semantics

Recommendation ITU-T Z.164 defines the operational semantics of TTCN-3 (Testing and Test Control Notation 3). The operational semantics are necessary to unambiguously interpret the specifications made with TTCN-3. This Recommendation is based on the TTCN-3 core language defined in [ITU T Z.161].

Z.165 (revised), Testing and Test Control Notation version 3: TTCN 3 runtime interface (TRI)

Recommendation ITU-T Z.165 provides the specification of the runtime interface for TTCN-3 (Testing and Test Control Notation 3) test system implementations. The TTCN-3 Runtime Interface provides the recommended adaptation for timing and communication of a test system to a particular processing platform and the system under test, respectively. This Recommendation defines the interface as a set of operations independent of target language.

The interface is defined to be compatible with ITU T Recommendation Z.161. This Recommendation uses the CORBA Interface Definition Language (IDL) to specify the TRI completely. Clauses 6 and 7 specify language mappings of the abstract specification to the target languages Java and ANSI-C. A summary of the IDL-based interface specification is provided in Annex A.

Z.166 (revised), Testing and Test Control Notation version 3: TTCN-3 control interface (TCI)

Recommendation ITU-T Z.166 specifies the control interfaces for TTCN-3 test system implementations. The TTCN-3 Control Interfaces provide a standardized adaptation for management, test component handling and encoding/decoding of a test system to a particular test platform. This Recommendation defines the interfaces as a set of operations independent of a target language.

- 38 -

The interfaces are defined to be compatible with the TTCN-3 standards (see clause 2). The interface definition uses the CORBA Interface Definition Language (IDL) to specify the TCI completely. Clauses 8 and 9 present language mappings for this abstract specification to the target languages Java and ANSI C. A summary of the IDL based interface specification is provided in Annex A.

Z.167 (revised), Testing and Test Control Notation version 3: TTCN-3 mapping from ASN.1

Recommendation ITU-T Z.167 defines a normative way of using ASN.1 as defined in Recommendations ITU-T X.680, ITU-T X.681, ITU-T X.682 and ITU-T X.683 with TTCN-3. The harmonization of other languages with TTCN-3 is not covered by this Recommendation.

Z.168 (revised), Testing and Test Control Notation version 3: TTCN-3 mapping from CORBA IDL

Recommendation ITU-T Z.168 defines the mapping rules for CORBA IDL (as defined in chapter 3 in Draft Approved Specification ptc/06-05-01 (2006)) to TTCN-3 (as defined in Recommendation ITU-T Z.161) to enable testing of CORBA-based systems. The principles of mapping CORBA IDL to TTCN-3 can be also used for the mapping of interface specification languages of other object-/component-based technologies.

The specification of other mappings is outside the scope of this Recommendation.

Z.169 (revised), Testing and Test Control Notation version 3: TTCN-3 mapping from XML data definition

Recommendation ITU-T Z.169 defines the mapping rules for W3C Schema to TTCN-3 to enable testing of XML-based systems, interfaces and protocols.

Z.170 (revised), Testing and Test Control Notation version 3: TTCN-3 documentation comment specification

Recommendation ITU-T Z.170 defines a documentation of TTCN-3 source code using special documentation comments. The source code documentation can then be produced automatically from the TTCN-3 core language, e.g., in the form of hypertext web pages.

___________