Security framework and requirements for open capabilities of telecommunication services |
|
Currently, due to the boom in over-the-top (OTT) services in the information communication technology (ICT) domain, operators need to explore innovative ways to cooperate with third party service providers and especially with information technology (IT) service providers in order to avoid the traffic growth associated with such services without the commensurate income increases. Open capabilities of telecommunication services can bridge the operators' telecommunication services capabilities and the third party service providers' customized service requirements, thus becoming a win-win cooperation paradigm.
As the core asset for operators, capabilities of telecommunication services should be opened in a secure way and be fully protected, as both operators' business security and users' information security are implicated. Without a comprehensive security mechanism, an unsecure/spiteful application/service from a third party service provider using the capabilities of telecommunication services may harm the operators' transmission network, business system and even users' personally identifiable information (PII). Consequently, in order to offer secure telecommunication service capabilities to cooperative service providers, the security requirements for open capabilities of telecommunication services need to be analysed exhaustively and an overall security framework needs to be established.
Recommendation ITU-T X.1145 focuses on an analysis of the security requirements of open capabilities of telecommunication services and provides a security framework.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/13260 |
Series title: |
X series: Data networks, open system communications and security X.1100-X.1199: Secure applications and services (I) X.1140-X.1149: Web security (I) |
Approval date: |
2017-05-14 |
Provisional name: | X.websec-6 |
Approval process: | AAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
Development history
|
|
|
Ed. |
ITU-T Recommendation |
Status |
Summary |
Table of Contents |
Download |
1
|
X.1145 (05/2017)
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
|