Table 4 - CCITT Plenary Assemblies and Recommendations Approved
Study Period
Book
Plenary Assembly
Dates
X-series Recommendations
Z-series Recommendations
1969-1972 Green Book Vth CCITT Plenary Assembly 4-15 December 1972 11 (Public data networks - X.1, X.2, X.20, X.21, X.30, X.31, X.32, X.33, X.40, X.50, X.70)
1973-1976 Orange Book VIth CCITT Plenary Assembly 27 September – 8 October 1976 24 (Public data networks) 3 (SDL – Z.100-series)
8 (MML – Z.300-series)
1977-1980 Yellow Book VIIth CCITT Plenary Assembly 10-21 November 1980 39 (Public data networks) 4 (SDL – Z.100-series)
1 (CHILL – Z.200)
9 (MML – Z.300-series)
1981-1984 Red Book VIIIth CCITT Plenary Assembly 8-19 October 1984 56 (Public data networks)
9 (OSI – X.200-series)
8 (MHS – X.400-series) 5 (SDL – Z.100-series)
1 (CHILL – Z.200)
15 (MML – Z.300-series)
1985-1988 Blue Book IXth CCITT Plenary Assembly 14-25 November 1988 72 (Public data networks)
23 (OSI – X.200-series)
9 (MHS – X.400-series)
8 (Directory – X.500-series) 1 (SDL – Z.100)
1 (FDTs – Z.110)
1 (CHILL – Z.200)
19 (MML – Z.300-series)
Table 7 - X-series Recommendations under the responsibility of Study Group 17DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY
Subject
Recommendation Series
Number of Texts
Open Systems Interconnection
X.200-X.299
48
Model and notation X.200-X.209 2
Service definitions X.210-X.219 11
Connection-mode protocol specifications X.220-X.229 10
Connectionless-mode protocol specifications X.230-X.239 6
PICS proformas X.240-X.259 8
Protocol Identification X.260-X.269 3
Security Protocols X.270-X.279 2
Layer Managed Objects X.280-X.289 5
Conformance testing X.290-X.299 1
Message Handling Systems
X.400-X.499
25
Directory
X.500-X.599
11
OSI networking and system aspects
X.600-X.699
42 + 1 Supp.
Networking X.600-X.629 7
Efficiency X.630-X.639 6
Quality of service X.640-X.649 2
Naming, Addressing and Registration X.650-X.679 15 + 1 Supp.
Abstract Syntax Notation One (ASN.1) X.680-X.699 12
Security
X.800-X.849
20 + 4 Supp.
OSI applications
X.850-X.899
14
Commitment, Concurrency and Recovery X.850-X.859 3
Transaction processing X.860-X.879 4
Remote operations X.880-X.889 3
Generic applications of ASN.1 X.890-X.899 4
Open distributed processing
X.900-X.999
13
Information and network security
X.1000-X.1099
46 + 5 Supp.
General security aspects X.1000-X.1029 1
Network security X.1030-X.1049 17 + 1 Supp.
Security management X.1050-X.1069 11+ 4 Supp.
Telebiometrics X.1080-X.1099 17
Secure applications and services (1)
X.1100-X.1199
43 + 6 Supp.
Multicast security X.1100-X.1109 1
Home network security
X.1110-X.1119
4 + 1 Supp.
Mobile security X.1120-X.1139 7 + 2 Supp.
Web security (1)
X.1140-X.1149 9 + 3 Supp.
Application security (1)
X.1150-X.1159 9
Peer-to-peer security X.1160-X.1169 4
Networked ID security X.1170-X.1179 1
IPTV security X.1180-X.1199 8
Cyberspace security
X.1200-X.1299
43 + 15 Supp.
Cybersecurity X.1200-X.1229 14 + 5 Supp.
Countering spam X.1230-X.1249 15 + 8 Supp.
Identity management
X.1250-X.1279 14 + 2 Supp.
Secure applications and services (2)
X.1300-X.1499 39
Emergency communications X.1300-X.1309 2
Ubiquitous sensor network security
X.1310-X.1319 4
Smart grid security
X.1330-X.1339
3
Certified mail
X.1340-X.1349
1
Internet of things (IoT) security
X.1360-X.1369
9
Intelligent transportation system (ITS) security
X.1370-X.1389
6
Distributed ledger technology (DLT) security
X.1400-X.1429
9
Application Security (2)
X.1450-X.1469
4
Web security (2)
X.1470-X.1489
1
Cybersecurity information exchange
X.1500-X.1599
21
Overview of cybersecurity
X.1500-X.1519 2
Vulnerability/state exchange
X.1520-X.1539 10
Event/incident/heuristics exchange X.1540-X.1549 4
Exchange of policies X.1550-X.1559 1
Heuristics and information request X.1560-X.1569 0
Identification and discovery X.1570-X.1579 1
Assured exchange X.1580-X.1589 3
Cloud computing security X.1600-X.1699
10
Overview of cloud computing security
X.1600-X.1601
1
Cloud Computing security design
X.1602-X.1639
6
Cloud Computing security best practices and guidelines
X.1640-X.1659
3
Quantum communication
X.1700-X.1729
3
Quantum random number generator
X.1702-X.1709
1
Framework of QKDN security
X.1710-X.1711
1
Security design for QKDN
X.1712-X.1719
1
Data security
X.1750-X.1799
4
Big Data Security
X.1750-X.1759
3
Data protection
X.1779-X.1789
1
IMT-2020 security
X.1800-X.1819
1
Table 8 - Z-series Recommendations under the responsibility of Study Group 17LANGUAGES AND GENERAL SOFTWARE ASPECTS FOR TELECOMMUNICATION SYSTEMS
Subject
Recommendation Series
Number of Texts
Formal description techniques (FDT)
Z.100-Z.199
35 + 1 Supp.
Specification and Description Language (SDL) Z.100-Z.109 9 + 1 Supp.
Application of formal description techniques Z.110-Z.119 3
Message Sequence Chart (MSC) Z.120-Z.129 2
User Requirements Notation (URN) Z.150-Z.159 2
Testing and Test Control Notation (TTCN) Z.160-Z.179 19
Programming languages
Z.200-Z.299
1
CHILL: The ITU-T high level language Z.200-Z.209 1
Quality
Z.400-Z.499 1
Quality of telecommunication software Z.400-Z.409 0
Quality aspects of protocol-related Recommendations Z.450-Z.459 1
Middleware
Z.600-Z.699 0
Processing environment architectures Z.600-Z.609 0