Cadre général des technologies de la sécurité pour les communications mobiles de données de bout en bout |
![](images/pdf.png) |
La présente Recommandation décrit les problèmes de sécurité observés dans le domaine des communications mobiles de données de bout en bout, ainsi que les besoins de sécurité considérés du point de vue de l'utilisateur du service mobile et du fournisseur de services d'application (ASP, application service provider). Par ailleurs, la présente Recommandation indique le niveau d'intervention, dans les modèles de communications de données de bout en bout, des techniques de sécurité qui assurent certaines fonctions de sécurité. |
|
Citation: |
https://handle.itu.int/11.1002/1000/7288 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1120-X.1139: Mobile security |
Approval date: |
2004-04-29 |
Provisional name: | X.msec-1 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1121 (04/2004)
|
In force
|
here
|
here
|
here
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 19 (04/2013)
|
ITU-T X.1120-X.1139 series – Supplement on security aspects of smartphones
|
In force
|
here
|
here
|
here
|
X Suppl. 24 (09/2014)
|
ITU-T X.1120-X.1139 series - Supplement on a secure application distribution framework for communication devices
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security in telecommunications and information technology (7th edition)
|
2020
|
here
|
Security in Telecommunications and Information Technology
|
2015
|
here
|
Security in Telecommunications and Information Technology
|
2011
|
here
|
Security in Telecommunications and Information Technology
|
2009
|
here
|
Security in Telecommunications and Information Technology
|
2004
|
here
|
Security in Telecommunications and Information Technology
|
2003
|
here
|
|