| 
    
            
                
                    | 
                            
                                
                                
                             
                                | هذه التغييرات ضرورية لتصحيح عيوب في التصويب 1، ومن ثم فهي تحيل إلى أدلة موسومة "Sn" من التوصية ITU-T X.790 (Cor.1). |  |  
                    | 
 
                            
                                | Citation: | https://handle.itu.int/11.1002/1000/5408 |  
                                | Series title: | X series: Data networks, open system communications and security X.700-X.799: OSI management
 X.730-X.799: Management functions and ODMA functions
 |  
                                | Approval date: | 2001-03-01 |  | Approval process: | AAP |  
                                | Status: | In force |  
                                | Maintenance responsibility: | ITU-T Study Group 2 |  
                                | Further details: | Patent statement(s) Development history
 
 |  |  
    
    
    
 | 
		
			| 
				
					
						
                                    
   
    
        
            | X.790 (1995) Cor. 2 (2001-03) |  
            | Index of all ASN.1 assignments defined in this Recommendation. |  
            |  |  
							
            
                
                    | Click 
                        here 
                        to download all the modules of this Recommendation (zipped archive) |  
							    
            
                
                    | Click here to download all the modules needed to compile this Recommendation (zipped archive) |  
    
    
 
						
                                    
    
    
        
            | Title | Approved on | Download |  
                    | Guidelines for identity-based cryptosystems used for cross-domain secure communications | 2023 | here |  
                    | Overview of hybrid approaches for key exchange with quantum key distribution | 2022 | here |  
                    | Guidelines for security management of using artificial intelligence technology | 2022 | here |  
                    | Successful use of security standards (2nd edition) | 2020 | here |  
                    | Description of the incubation mechanism and ways to improve it | 2020 | here |  
                    | Strategic approaches to the transformation of security studies | 2020 | here |  
    
    
 |