Cadre général et méthodologie des tests de conformité d'interconnexion des systèmes ouverts pour les Recommandations sur les protocoles pour les applications de l'UIT-T – Spécification des tests de profil de protocole |
|
La présente Recommandation expose la méthodologie des tests de profil de protocole OSI fondée sur la méthodologie des tests de protocole spécifiée dans la Recommandation X.291. Elle précise la signification de la conformité à un profil, la méthode de formulation des conditions de conformité de profils et les principes des tests de profils fondés sur la méthodologie définie pour les spécifications de base des protocoles. Le texte a été élaboré conjointement avec le JTC 1 de l'ISO/CEI. |
|
Citation: |
https://handle.itu.int/11.1002/1000/2908 |
Series title: |
X series: Data networks, open system communications and security X.200-X.299: Open Systems Interconnection X.290-X.299: Conformance testing |
Approval date: |
1995-04-10 |
Identical standard: | ISO/IEC 9646-6:1994 (Twinned) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 11 |
Further details: |
Patent statement(s)
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.295 (04/1995)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 4 (09/2008)
|
ITU-T X.290-series – Supplement on generic approach to interoperability testing
|
In force
|
here
|
here
|
here
|
X Suppl. 5 (09/2008)
|
ITU-T X.290 series – Supplement on interoperability testing framework and methodology
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
OSI Implementers’ Guide - Version 1.1
|
2006-12-16
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
ISDN field trial guidelines
|
1991
|
here
|
|