International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Meeting 2014-01-15 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C (2014-01-15) 

ITU-T SG 17

Security

Study Period 2013

Meeting  from 2014-01-15 to 2014-01-24

held in Switzerland [Geneva]

Other Meetings : 2016-08-29  2016-03-14  2015-09-08  2015-04-08  2014-09-17  2013-08-26  2013-04-17 

Results:69 total items.
Result page:  1 - 2  - Next Next
Contributions  Documents / Contributions
 
Number 
Title Source AI/Question
Date
[ 226 ]  
 
Proposals on Cloud Security Components     Microsoft Corporation   Q8/17   2014-01-06
[ 225 ]  
 
Proposals for x.fsspvn     Microsoft Corporation   Q8/17   2014-01-06
[ 224 ]  
 
Proposed revision of Draft X.mgv6 (Security management guideline for implementation of IPv6 environment in telecommunications organizations) - Supplement of X.1037     KDDI Corporation, National Institute of Information and Communications Technology   Q3/17, Q2/17   2014-01-02
[ 223 ]  
 
Threats analysis for ITS communications - Initial study     KDDI Corporation, National Institute of Information and Communications Technology   Q6/17   2014-01-02
[ 222 ]  
 
Proposal of new work item - Guidelines for Personal Information Protection in Cloud Computing     China   Q8/17   2014-01-02
[ 221 ]  
 
Comparison of new work item and X.atag     Electronics and Telecommunications Research Institute (ETRI)   Q7/17, Q10/17   2014-01-02
[ 220 ]  
(Rev.1) 
Inputs and discussion for TD 0659 X. ticvs     India , Ministry of Communications and Information Technology   Q5/17   2014-01-02
[ 219 ]  
 
Proposal for a new work item on guidelines for using object identifiers (OID) for the Internet of Things     China Telecommunications Corporation , China Unicom , Ministry of Industry and Information Technology (MIIT) , ZTE Corporation   Q11/17   2014-01-02
[ 218 ]  
(Rev.1) 
Q3 Roadmap update     LAC CO. Ltd   Q3/17   2014-01-02
[ 217 ]  
 
 
Withdrawn
 
N/A   N/A   2014-01-02
[ 216 ]  
(Rev.1) 
Firth draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices     Korea (Rep. of)   Q9/17   2014-01-02
[ 215 ]  
(Rev.1) 
Firth draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices     Korea (Rep. of)   Q9/17   2014-01-02
[ 214 ]  
(Rev.1) 
Proposal of studying the security guidelines for the V2X communication system     Korea (Rep. of)   Q6/17   2014-01-02
[ 213 ]  
(Rev.1) 
Proposal of the 3rd draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813     Korea (Rep. of)   Q7/17   2014-01-02
[ 212 ]  
 
Security implication on Software-Defined Networking (SDN)     Electronics and Telecommunications Research Institute (ETRI)   Q6/17   2014-01-02
[ 211 ]  
(Rev.1) 
A proposal for the telecommunication specific implementation guidance text for newly introduced controls on 2nd draft text for Recommendation ITU-T X.1051-rev     Korea (Rep. of)   Q3/17   2014-01-02
[ 210 ]  
(Rev.1) 
Proposed revised text on draft Recommendation ITU-T X.msec-8: Secure application distribution framework for communication devices     Korea (Rep. of)   Q6/17   2014-01-02
[ 209 ]  
(Rev.1) 
Proposal for modifications of X.sgsec-1 : Security functional architecture for smart grid services using the telecommunication network     Korea (Rep. of)   Q6/17   2014-01-02
[ 208 ]  
(Rev.1-2) 
Proposal for supplement to X.1144 - Enhancements and new features in XACML 3.0     Korea (Rep. of)   Q7/17, Q10/17   2014-01-02
[ 207 ]  
(Rev.1) 
A proposal for the final revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks     Korea (Rep. of)   Q4/17   2014-01-02
[ 206 ]  
(Rev.1) 
A proposal for the 3rd revised text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices     Korea (Rep. of)   Q7/17   2014-01-02
[ 205 ]  
(Rev.1) 
A proposal for the 4th revised text for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations     Korea (Rep. of)   Q3/17   2014-01-02
[ 204 ]  
(Rev.1) 
A proposal for the 9th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks     Korea (Rep. of)   Q4/17   2014-01-02
[ 203 ]  
(Rev.1) 
Basic principles to study new security issues (e.g. security for ITS and SDN)     Korea (Rep. of)   Q6/17, Q2/17   2014-01-02
[ 202 ]  
(Rev.1) 
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices     Korea (Rep. of)   Q7/17   2014-01-02
[ 201 ]  
 
Proposed modifications to draft X.1051-rev, "Information security management guidelines for telecommunications organizations based on ISO/IEC 27002"     KDDI Corporation   Q3/17   2014-01-02
[ 200 ]  
(Rev.1) 
Final text of draft Recommendation ITU-T X.websec-5: Security framework for web mashup services (for agreement)     Electronics and Telecommunications Research Institute (ETRI)   Q7/17   2014-01-01
[ 199 ]  
(Rev.1) 
Proposal for a new clause about testing and evaluation to X.msec-8     Ministry of Industry and Information Technology (MIIT)   Q6/17   2014-01-01
[ 198 ]  
(Rev.1-2) 
Proposal for a new work item: Security Guidelines for Virtual Network Operator (VNO)     Beijing University of Posts and Telecommunications , China Telecommunications Corporation , Ministry of Industry and Information Technology (MIIT)   Q2/17   2014-01-01
[ 197 ]  
(Rev.1) 
Draft of Survey Questionnaire on Countering Spam     Ministry of Industry and Information Technology (MIIT)   Q5/17   2014-01-01
[ 196 ]  
(Rev.1) 
Proposal for add Section 5.4, the description of "individual information service" in X.gsiiso     China Unicom   Q2/17   2013-12-31
[ 195 ]  
(Rev.1) 
Proposal for X.goscc: Add content for Section 8.6     China Unicom   Q8/17   2013-12-31
[ 194 ]  
(Rev.1) 
Proposal for X.goscc: Add content for Section 8.4     China Unicom   Q8/17   2013-12-31
[ 193 ]  
(Rev.1) 
Proposal for a new work item: Guideline for virtualization security in cloud     China , China Unicom , ZTE Corporation   Q8/17   2013-12-31
[ 192 ]  
(Rev.1) 
Proposal for update Section 10 of X.tfcmm     China Unicom   Q5/17   2013-12-31
[ 191 ]  
(Rev.1) 
Proposal for update Section 9 of X.tfcmm     China Unicom   Q5/17   2013-12-31
[ 190 ]  
(Rev.1) 
Proposal for X.unsec-1: draft for consent     China Unicom , ZTE Corporation   Q6/17   2013-12-31
[ 189 ]  
(Rev.1) 
Proposal for a new work item on "The security requirement framework for smartphones-based botnet"     China Unicom   Q4/17   2013-12-31
[ 188 ]  
(Rev.1) 
Proposed text for configuration management of X.goscc     China Telecommunications Corporation , China   Q8/17   2013-12-31
[ 187 ]  
(Rev.1) 
Proposed text for security monitoring of X.goscc     China Telecommunications Corporation , China   Q8/17   2013-12-31
[ 186 ]  
(Rev.1) 
Proposed revised text for the scope of X.goscc     China Telecommunications Corporation   Q8/17   2013-12-31
[ 185 ]  
(Rev.1) 
Proposed new work item on Technical Requirements for Countering Instant Messaging Spam     China Telecommunications Corporation , China , ZTE Corporation   Q5/17   2013-12-31
[ 184 ]  
(Rev.1) 
Proposed security requirements for X.sfcse     China Telecommunications Corporation   Q8/17   2013-12-31
[ 183 ]  
(Rev.1) 
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2013-12-31
[ 182 ]  
(Rev.1) 
ITU-T x.orf: A proposal for modification of scenarios in Clause 9     Electronics and Telecommunications Research Institute (ETRI)   Q11/17   2013-12-31
[ 181 ]  
(Rev.1) 
ITU-T x.orf: A proposal for modification of requirements in Clause 8     Electronics and Telecommunications Research Institute (ETRI)   Q11/17   2013-12-31
[ 180 ]  
(Rev.1) 
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2013-12-31
[ 179 ]  
(Rev.1) 
X.authi: Guideline to implement the authentication integration of the network layer and the service layer     China Mobile Communications Corporation , China , ZTE Corporation   Q10/17   2013-12-31
[ 178 ]  
(Rev.1) 
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"     China Mobile Communications Corporation   Q3/17   2013-12-31
[ 177 ]  
(Rev.1-3) 
A proposal of new work item : reference monitor for online analytics applications     Electronics and Telecommunications Research Institute (ETRI)   Q7/17   2013-12-31
Results:69 total items.
Result page:  1 - 2  - Next Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2016-12-10