Internet Security Glossary - References


[A3092] American National Standards Institute, "American National Standard Data Encryption Algorithm", ANSI X3.92-1981, 30 Dec 1980.
[A9009] ---, "Financial Institution Message Authentication (Wholesale)", ANSI X9.9-1986, 15 Aug 1986.
[A9017] ---, "Financial Institution Key Management (Wholesale)", X9.17, 4 Apr 1985. [Defines procedures for the manual and automated management of keying material and uses DES to provide key management for a variety of operational environments.]
[A9042] ---, "Public key Cryptography for the Financial Service Industry: Agreement of Symmetric Keys Using Diffie-Hellman and MQV Algorithms", X9.42, 29 Jan 1999.
[A9052] ---, "Triple Data Encryption Algorithm Modes of Operation", X9.52-1998, ANSI approval 9 Nov 1998.
[A9062] ---, "Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)", X9.62-1998, ANSI approval 7 Jan 1999.
[ABA] American Bar Association, "Digital Signature Guidelines: Legal Infrastructure for Certification Authorities and Secure Electronic Commerce", Chicago, IL, 1 Aug 1996.
[ACM] Association for Computing Machinery, "Communications of the ACM", Jul 1998 issue with: Minerva M. Yeung, "Digital Watermarking"; Nasir Memom and Ping Wah Wong, "Protecting Digital Media Content"; and Scott Craver, Boon-Lock Yeo, and Minerva Yeung, "Technical Trials and Legal Tribulations".
[Army] U.S. Army Corps of Engineers, "Electromagnetic Pulse (EMP) and Tempest Protection for Facilities", EP 1110-3-2, 31 Dec 1990.
[B7799] British Standards Institution, "Information Security Management, Part 1: Code of Practice for Information Security Management", BS 7799-1:1999, effective 15 May 1999. ---, ---, "Part 2: Specification for Information Security Management Systems", BS 7799-2:1999, effective 15 May 1999.
[Bell] D. E. Bell and L. J. LaPadula, "Secure Computer Systems: Mathematical Foundations and Model", M74-244, The MITRE Corporation, Bedford, MA, May 1973. (Available as AD-771543, National Technical Information Service, Springfield, VA.)
[CCIB] Common Criteria Implementation Board, "Common Criteria for Information Technology Security Evaluation, Part 1: Introduction and General Model", ver. 2.1, CCIB-99-01, Aug 1999.
[CIPSO] Trusted Systems Interoperability Working Group, "Common IP Security Option", ver. 2.3, 9 Mar 1993. [A "work in progress" that is probably defunct.]
[CSC1] U.S. Department of Defense Computer Security Center, "Department of Defense Trusted Computer System Evaluation Criteria", CSC-STD-001-83, 15 Aug 1983. (Superseded by [DOD1].)
[CSC2] ---, "Department of Defense Password Management Guideline", CSC-STD-002-85, 12 Apr 1985.
[CSC3] ---, "Computer Security Requirements: Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments", CSC-STD-003-85, 25 Jun 1985.
[CSOR] U.S. Department of Commerce, "General Procedures for Registering Computer Security Objects", National Institute of Standards Interagency Report 5308, Dec 1993.
[DH76] W. Diffie and M. H. Hellman, "New Directions in Cryptography" in "IEEE Transactions on Information Theory", vol. IT-22, no. 6, Nov 1976, pp. 644-654.
[DOD1] U.S. Department of Defense, "Department of Defense Trusted Computer System Evaluation Criteria", DoD 5200.28-STD, 26 Dec 1985. (Supersedes [CSC1].)
[DOD2] ---, Directive 5200.28, "Security Requirements for Automated Information Systems (AISs)", 21 Mar 1988.
[DOD3] ---, "X.509 Certificate Policy", ver. 2, Mar 1999.
[DOD4] ---, "NSA Key Recovery Assessment Criteria", 8 Jun 1998.
[Denn] D. E. Denning, "A Lattice Model of Secure Information Flow", in "Communications of the ACM", vol. 19, no. 5, May 1976, pp. 236-243.
[EMV1] Europay International S.A., MasterCard International Incorporated, and Visa International Service Association, "EMV '96 Integrated Circuit Card Specification for Payment Systems", ver. 3.1.1, 31 May 1998.
[EMV2] ---, "EMV '96 Integrated Circuit Card Terminal Specification for Payment Systems", ver. 3.1.1, 31 May 1998.
[EMV3] ---, EMV '96 Integrated Circuit Card Application Specification for Payment Systems", ver. 3.1.1, 31 May 1998.
[ElGa] T. El Gamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms" in "IEEE Transactions on Information Theory", vol. IT-31, no. 4, 1985, pp. 469- 472.
[FP031] U.S. Department of Commerce, "Guidelines for Automatic Data Processing Physical Security and Risk Management", Federal Information Processing Standards Publication (FIPS PUB) 31, Jun 1974.
[FP039] ---, "Glossary for Computer Systems Security", FIPS PUB 39, 15 Feb 1976.
[FP046] ---, "Data Encryption Standard (DES)", FIPS PUB 46-2, 30 Dec 1993.
[FP081] ---, "DES Modes of Operation", FIPS PUB 81, 2 Dec 1980.
[FP102] ---, "Guideline for Computer Security Certification and Accreditation", FIPS PUB 102, 27 Sep 1983.
[FP113] ---, "Computer Data Authentication", FIPS PUB 113, 30 May 1985.
[FP140] ---, "Security Requirements for Cryptographic Modules", FIPS PUB 140-1, 11 Jan 1994.
[FP151] ---, "Portable Operating System Interface (POSIX)--System Application Program Interface [C Language]", FIPS PUB 151-2, 12 May 1993
[FP180] ---, "Secure Hash Standard", FIPS PUB 180-1, 17 Apr 1995.
[FP185] ---, "Escrowed Encryption Standard", FIPS PUB 185, 9 Feb 1994.
[FP186] ---, "Digital Signature Standard (DSS)", FIPS PUB 186, 19 May 1994.
[FP188] ---, "Standard Security Label for Information Transfer", FIPS PUB 188, 6 Sep 1994.
[FPDAM] Collaborative ITU and ISO/IEC meeting on the Directory, "Final Proposed Draft Amendment on Certificate Extensions", April 1999. (This draft proposes changes to [X.509].)
[FPKI] U.S. Department of Commerce, "Public Key Infrastructure (PKI) Technical Specifications: Part A--Technical Concept of Operations", National Institute of Standards, 4 Sep 1998.
[For94] W. Ford, "Computer Communications Security: Principles, Standard Protocols and Techniques", ISBN 0-13-799453-2, 1994.
[For97] W. Ford and M. Baum, "Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption", ISBN 0-13-476342-4, 1994.
[I15408] ---, "Information Technology--Security Techniques-- Evaluation criteria for IT Security--Part 1: Introduction and General Model", ISO/IEC 15408-1:1999.
[I3166] International Standards Organization, "Codes for the Representation of Names of countries and Their Subdivisions --Part 1: Country Codes", ISO 3166-1:1997. ---, --- "Part 2: Country Subdivision Codes", ISO/DIS 3166- 2. ---, --- "Part 3: Codes for Formerly Used Names of Countries", ISO/DIS 3166-3.
[I7498] ---, "Information Processing Systems--Open Systems Interconnection Reference Model--[Part 1:] Basic Reference Model", ISO/IEC 7498-1. (Equivalent to ITU-T Recommendation X.200.) ---, --- "Part 2: Security Architecture", ISO/IEC 7499-2. ---, --- "Part 4: Management Framework", ISO/IEC 7498-4.
[I7812] ---, "Identification cards--Identification of Issuers--Part 1: Numbering System", ISO/IEC 7812-1:1993 ---, --- "Part 2: Application and Registration Procedures", ISO/IEC 7812-2:1993.
[I9945] ---, "Portable Operating System Interface for Computer Environments", ISO/IEC 9945-1:1990.
[ITSEC] "Information Technology Security Evaluation Criteria (ITSEC): Harmonised Criteria of France, Germany, the Netherlands, and the United Kingdom", ver. 1.2, U.K. Department of Trade and Industry, Jun 1991.
[Kahn] David Kahn, "The Codebreakers: The Story of Secret Writing", The Macmillan Company, New York, 1967.
[Knuth] D. E. Knuth, Chapter 3 ("Random Numbers") in Volume 2 ("Seminumerical Algorithms") of "The Art of Computer Programming", Addison-Wesley, Reading, MA, 1969.
[Kuhn] Markus G. Kuhn and Ross J. Anderson, "Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations", in David Aucsmith, ed., "Information Hiding, Second International Workshop, IH'98", Portland, Oregon, USA, 15-17 Apr 1998, LNCS 1525, Springer-Verlag, ISBN 3-540-65386-4, pp. 124-142.
[MISPC] U.S. Department of Commerce, "Minimum Interoperability Specification for PKI Components (MISPC), Version 1", National Institute of Standards Special Publication 800-15, Sep 1997.
[NCS01] National Computer Security Center, "A Guide to Understanding Audit in Trusted Systems", NCSC-TG-001, 1 Jun 1988. (Part of the Rainbow Series.)
[NCS04] ---, "Glossary of Computer Security Terms", NCSC-TG-004, ver. 1, 21 Oct 1988. (Part of the Rainbow Series.)
[NCS05] ---, "Trusted Network Interpretation of the Trusted Computer System Evaluation Criteria", NCSC-TG-005, ver. 1, 31 Jul 1987. (Part of the Rainbow Series.)
[NCS25] ---, "A Guide to Understanding Data Remanence in Automated Information Systems", NCSC-TG-025, ver. 2, Sep 1991. (Part of the Rainbow Series.)
[NIST] National Institute of Standards and Technology, "SKIPJACK and KEA Algorithm Specifications", ver. 2, 29 May 1998. (http://csrc.nist.gov/encryption/skipjack-kea.htm)
[PGP] Simson Garfinkel, "PGP: Pretty Good Privacy", O'Reilly & Associates, Inc., Sebastopol, CA, 1995.
[PKC07] RSA Laboratories, "PKCS #7: Cryptographic Message Syntax Standard", ver. 1.5, RSA Laboratories Technical Note, 1 Nov 1993.
[PKC10] ---, "PKCS #10: Certification Request Syntax Standard", ver. 1.0, RSA Laboratories Technical Note, 1 Nov 1993.
[PKC11] ---, "PKCS #11: Cryptographic Token Interface Standard", ver. 1.0, 28 Apr 1995.
[PKCS] Burton S. Kaliski, Jr., "An Overview of the PKCS Standards", RSA Data Security, Inc., 3 Jun 1991.
[R0768] Postel, J., "User Datagram Protocol", STD 6, RFC 768, August 1980.
[R0791] Postel, J., "Internet Protocol", STD 5, RFC 791, September 1981.
[R0792] Postel, J., "Internet Control Message Protocol", STD 5, RFC 792, September 1981. [See: RFC 1885.]
[R0793] Postel, J., ed., "Transmission Control Protocol", STD 7, RFC 793, September 1981.
[R0821] Postel, J., "Simple Mail Transfer Protocol", STD 10, RFC 821, August 1982.
[R0822] Crocker, D., "Standard for the Format of ARPA Internet Text Messages", STD 11, RFC 822, August 1982.
[R0854] Postel, J. and J. Reynolds, "TELNET Protocol Specification", STD 8, RFC 854, May 1983.
[R0959] Postel, J. and J. Reynolds, "File Transfer Protocol (FTP)", STD 9, RFC 959, October 1985.
[R1034] Mockapetris, P., "Domain Names--Concepts and Facilities", STD 13, RFC 1034, November 1987.
[R1157] Case, J., Fedor, M., Schoffstall, M. and J. Davin, "A Simple Network Management Protocol (SNMP)" [version 1], STD 15, RFC 1157, May 1990.
[R1208] Jacobsen O. and D. Lynch, "A Glossary of Networking Terms", RFC 1208, March 1991.
[R1319] Kaliski, B., "The MD2 Message-Digest Algorithm", RFC 1319, April 1992.
[R1320] Rivest, R., "The MD4 Message-Digest Algorithm", RFC 1320, April 1992.
[R1321] Rivest, R., "The MD5 Message-Digest Algorithm", RFC 1321, April 1992.
[R1334] Lloyd, B. and W. Simpson, "PPP Authentication Protocols", RFC 1334, October 1992.
[R1413] St. Johns, M., "Identification Protocol", RFC 1413, February 1993.
[R1421] Linn, J., "Privacy Enhancement for Internet Electronic Mail, Part I: Message Encryption and Authentication Procedures", RFC 1421, February 1993.
[R1422] Kent, S., "Privacy Enhancement for Internet Electronic Mail, Part II: Certificate-Based Key Management", RFC 1422, February 1993.
[R1455] Eastlake, D., "Physical Link Security Type of Service", RFC 1455, May 1993.
[R1457] Housley, R., "Security Label Framework for the Internet", RFC 1457, May 1993.
[R1492] Finseth, C., "An Access Control Protocol, Sometimes Called TACACS", RFC 1492, July 1993.
[R1507] Kaufman, C., "DASS: Distributed Authentication Security Service", RFC 1507, September 1993.
[R1510] Kohl, J. and C. Neuman, "The Kerberos Network Authentication Service (V5)", RFC 1510, September 1993.
[R1591] Kohl, J. and C. Neuman, "Domain Name System Structure and Delegation", March 1994.
[R1630] Berners-Lee, T., "Universal Resource Identifiers in WWW", RFC 1630, June 1994.
[R1661] Simpson, W., ed., " The Point-to-Point Protocol (PPP)", STD 51, RFC 1661, July 1994.
[R1731] Myers, J., "IMAP4 Authentication Mechanisms", RFC 1731, December 1994.
[R1734] Myers, J., "POP3 AUTHentication Command", RFC 1734, December 1994.
[R1738] Myers, J., Masinter, L. and M. McCahill, ed's., "Uniform Resource Locators (URL)", RFC 1738, December 1994.
[R1750] Eastlake, D., Crocker, S. and J. Schiller, "Randomness Recommendations for Security", RFC 1750, December 1994.
[R1777] Yeong, W., Howes, T. and S. Kille, "Lightweight Directory Access Protocol", RFC 1777, March 1995.
[R1808] Fielding, R., "Relative Uniform Resource Locators", RFC 1808, June 1995.
[R1824] Danisch, H., "The Exponential Security System TESS: An Identity-Based Cryptographic Protocol for Authenticated Key- Exchange (E.I.S.S.-Report 1995/4)", RFC 1824, August 1995.
[R1828] Metzger, P. and W. Simpson, "IP Authentication using Keyed MD5", RFC 1828, August 1995.
[R1829] Karn, P., Metzger, P. and W. Simpson, "The ESP DES-CBC Transform", RFC 1829, August 1995.
[R1848] Crocker, S., Freed, N., Galvin, J. and S. Murphy, "MIME Object Security Services", RFC 1848, October 1995.
[R1851] Karn, P., Metzger, P. and W. Simpson, "The ESP Triple DES Transform", RFC 1851, September 1995.
[R1866] Berners-Lee, T., "Hypertext Markup Language--2.0", RFC 1866, November 1995.
[R1885] Conta, A. and S. Deering, "Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification", RFC 1885, December 1995.
[R1928] Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D. and L. Jones, "SOCKS Protocol Version 5", RFC 1928, March 1996.
[R1938] Haller, N. and C. Metzion, "A One-Time Password System", RFC 1938, May 1996.
[R1939] Myers, J. and M. Rose, "Post Office Protocol - Version 3", STD 53, RFC 1939, May 1996.
[R1958] Carpenter, B., ed., "Architectural Principles of the Internet", RFC 1958, June 1996.
[R1983] Malkin, G., ed., "Internet Users' Glossary", FYI 18, RFC 1983, August 1996.
[R1994] Simpson, W. "PPP Challenge Handshake Authentication Protocol (CHAP)", RFC 1994, August 1996.
[R2023] Postel, J. and J. Reynolds, "Instructions to RFC Authors", RFC 2023, October 1997.
[R2026] Bradner, S., "The Internet Standards Process--Revision 3", BCP 9, RFC 2026, March 1994.
[R2045] Freed, N. and N. Borenstein, "Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies", RFC 2045, November 1996.
[R2060] Crispin, M., "Internet Message Access Protocol--Version 4 Revision 1", RFC 2060, December 1996.
[R2065] Eastlake, D., 3rd, "Domain Name System Security Extensions", RFC 2065, January 1997.
[R2078] Linn, J., "Generic Security Service Application Program Interface, Version 2", RFC 2078, January 1997.
[R2084] Bossert, G., Cooper, S. and W. Drummond, "Considerations for Web Transaction Security", RFC 2084, January 1997.
[R2104] Krawczyk, H., Bellare, M. and R. Canetti, "HMAC: Keyed- Hashing for Message Authentication", RFC 2104, February 1997.
[R2119] Bradner, S., "Key Words for Use in RFCs To Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.
[R2137] Eastlake, D., "Secure Domain Name System Dynamic Update", RFC 2137, April 1997.
[R2138] Rigney, C., Rubens, A., Simpson, W. and S. Willens, "Remote Authentication Dial In User Service (RADIUS)", RFC 2138, April 1997.
[R2179] Gwinn, A., "Network Security For Trade Shows", RFC 2179, July 1997.
[R2195] Klensin, J., Catoe, R. and P. Krumviede, "IMAP/POP AUTHorize Extension for Simple Challenge/Response", RFC 2195, Sepember 1997.
[R2196] Fraser, B., "Site Security Handbook", FYI 8, RFC 2196, Sepember 1997.
[R2202] Cheng, P. and R. Glenn, "Test Cases for HMAC-MD5 and HMAC- SHA-1", RFC 2202, Sepember 1997.
[R2222] Myers, J., "Simple Authentication and Security Layer (SASL)", RFC 2222, October 1997.
[R2223] Postel, J., "Instructions to RFC Authors", RFC 2223, October 1997.
[R2246] Dierks, T. and C. Allen, "The TLS Protocol, Version 1.0", RFC 2246, January 1999.
[R2284] Blunk, L. and J. Vollbrecht, "PPP Extensible Authentication Protocol (EAP)", RFC 2284, March 1998.
[R2315] Kaliski, B., "PKCS #7: Cryptographic Message Syntax, Version 1.5", RFC 2315, March 1998.
[R2323] Ramos, A., "IETF Identification and Security Guidelines", RFC 2323, 1 April 1998. [Intended for humorous entertainment ("please laugh loud and hard"); does not contain serious security information.]
[R2350] Brownlee, N. and E. Guttman, "Expectations for Computer Security Incident Response", RFC 2350, June 1998.
[R2356] Montenegro, C. and V. Gupta, "Sun's SKIP Firewall Traversal for Mobile IP", RFC 2356, June 1998.
[R2373] Hinden, R. and S. Deering, "IP Version 6 Addressing Architecture", RFC 2373, July 2998.
[R2401] Kent, S. and R. Atkinson, "Security Architecture for the Internet Protocol", RFC 2401, November 1998.
[R2402] Kent, S. and R. Atkinson, "IP Authentication Header", RFC 2402, November 1998.
[R2403] Madson, C. and R. Glenn, "The Use of HMAC-MD5-96 within ESP and AH", RFC 2403, November 1998.
[R2404] Madson, C. and R. Glenn, "The Use of HMAC-SHA-1-96 within ESP and AH", RFC 2404, November 1998.
[R2405] Madson, C. and N. Doraswamy, "The ESP DES-CBC Cipher Algorithm With Explicit IV", RFC 2405, November 1998.
[R2406] Kent, S. and R. Atkinson, "IP Encapsulating Security Payload (ESP)", RFC 2406, November 1998.
[R2407] Piper, D., "The Internet IP Security Domain of Interpretation for ISAKMP", RFC 2407, November 1998.
[R2408] Maughan, D., Schertler, M., Schneider, M. and J. Turner, "Internet Security Association and Key Management Protocol (ISAKMP)", RFC 2408, November 1998.
[R2409] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)", RFC 2409, November 1998.
[R2410] Glenn, R. and S. Kent, "The NULL Encryption Algorithm and Its Use With IPsec", RFC 2410, November 1998.
[R2412] Orman, H., "The OAKLEY Key Determination Protocol", RFC 2412, November 1998.
[R2451] Pereira, R. and R. Adams, "The ESP CBC-Mode Cipher Algorithms", RFC 2451, November 1998.
[R2460] Deering, S. and R. Hinden, "Internet Protocol, Version 6 (IPv6) Specification", RFC 2460, December 1998.
[R2504] Guttman, E., Leong, L. and G. Malkin, "Users' Security Handbook", RFC 2504, February 1999.
[R2510] Adams, C. and S. Farrell, "Internet X.509 Public Key Infrastructure Certificate Management Protocols", RFC 2510, March 1999.
[R2527] Chokhani, S. and W. Ford, "Internet X.509 Public Key Infrastructure, Certificate Policy and Certification Practices Framework", RFC 2527, March 1999.
[R2536] EastLake, D., "DSA KEYs and SIGs in the Domain Name System (DNS)", RFC 2536, March 1999.
[R2570] Case, J., Mundy, R., Partain, D. and B. Stewart, "Introduction to Version 3 of the Internet-Standard Network Management Framework", RFC 2570, April 1999.
[R2574] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM) for Version 3 of the Simple Network Management Protocol (SNMPv3)", RFC 2574, April 1999.
[R2612] Adams, C. and J. Gilchrist, "The CAST-256 Encryption Algorithm", RFC 2612, June 1999.
[R2616] Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P. and T. Berners-Lee, "Hypertext Transfer Protocol-- HTTP/1.1", RFC 2616, June 1999.
[R2628] Smyslov, V., "Simple Cryptographic Program Interface", RFC 2628, June 1999.
[R2630] Housley, R., "Cryptographic Message Syntax", RFC 2630, June 1999.
[R2631] Rescorla, E., "Diffie-Hellman Key Agreement Method", RFC 2631, June 1999.
[R2633] Ramsdell, B., ed., "S/MIME Version 3 Message Specification", RFC 2633, June 1999.
[R2634] Hoffman, P., ed., "Enhanced Security Services for S/MIME", RFC 2634, June 1999.
[R2635] Hambridge, S. and A. Lunde, "Don't Spew: A Set of Guidelines for Mass Unsolicited Mailings and Postings", RFC 2635, June 1999.
[Raym] E. S. Raymond, ed., "The On-Line Hacker Jargon File", ver. 4.0.0, 24 Jul 1996. (Also available as "The New Hacker's Dictionary", 2nd edition, MIT Press, Sep 1993, ISBN 0-262- 18154-1. See: http://www.tuxedo.org/jargon/ for the latest version.)
[Russ] D. Russell and G. T. Gangemi Sr., Chapter 10 ("TEMPEST") in "Computer Security Basics", ISBN 0-937175-71-4, 1991.
[SDNS3] U.S. Department of Defense, National Security Agency, "Secure Data Network Systems, Security Protocol 3 (SP3)", document SDN.301, Revision 1.5, 15 May 1989.
[SDNS4] ---, ---, "Security Protocol 4 (SP4)", document SDN.401, Revision 1.2, 12 Jul 1988.
[SDNS7] ---, ---, "Secure data Network System, Message Security Protocol (MSP)", document SDN.701, Revision 4.0, 7 Jun 1996, with Corrections to Message Security Protocol, SDN.701, Rev 4.0", 96-06-07, 30 Aug, 1996.
[SET1] MasterCard and Visa, "SET Secure Electronic Transaction Specification, Book 1: Business Description", ver. 1.0, 31 May 1997.
[SET2] ---, "SET Secure Electronic Transaction Specification, Book 2: Programmer's Guide", ver. 1.0, 31 May 1997.
[Schn] B. Schneier, "Applied Cryptography", John Wiley & Sons, Inc., New York, 1994.
[Stei] J. Steiner, C. Neuman, and J. Schiller, "Kerberos: An Authentication Service for Open Network Systems" in "Usenix Conference Proceedings", Feb 1988.
[X400] International Telecommunications Union--Telecommunication Standardization Sector (formerly "CCITT"), Recommendation X.400, "Message Handling Services: Message Handling System and Service Overview".
[X500] ---, Recommendation X.500, "Information Technology--Open Systems Interconnection--The Directory: Overview of Concepts, Models, and Services". (Equivalent to ISO 9594-1.)
[X501] ---, Recommendation X.501, "Information Technology--Open Systems Interconnection--The Directory: Models".
[X509] ---, Recommendation X.509, "Information Technology--Open Systems Interconnection--The Directory: Authentication Framework". (Equivalent to ISO 9594-8.)
[X519] ---, Recommendation X.519, "Information Technology--Open Systems Interconnection--The Directory: Protocol Specifications".
[X520] ---, Recommendation X.520, "Information Technology--Open Systems Interconnection--The Directory: Selected Attribute Types".
[X680] ---, Recommendation X.680, "Information Technology--Abstract Syntax Notation One (ASN.1)--Specification of Basic Notation", 15 Nov 1994. (Equivalent to ISO/IEC 8824-1.)
[X690] ---, Recommendation X.690, "Information Technology--ASN.1 Encoding Rules--Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)", 15 Nov 1994. (Equivalent to ISO/IEC 8825-1.)