International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Meeting 2014-09-17 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C (2014-09-17) 

ITU-T SG 17

Security

Study Period 2013

Meeting  from 2014-09-17 to 2014-09-26

held in Switzerland [Geneva]

Other Meetings : 2015-09-16  2015-04-08  2014-01-15  2013-08-26  2013-04-17 

Results:82 total items.
Result page:  1 - 2 - 3 - 4  - Next Next
Contributions  Documents / Contributions
 
Number 
Received Source Title Questions
[ 308 ]  
 
2014-09-04 United Kingdom   Comments on x.msec-8     Q6/17  
[ 307 ]  
 
2014-09-04 United Kingdom   Comments on x.msec-7     Q6/17  
[ 306 ]  
 
2014-09-04 KDDI Corporation , National Institute of Information and Communications Technology (NICT)   Proposal of a new work item : Secure software update for ITS communications devices (X.suits)     Q6/17  
[ 305 ]  
 
2014-09-04 KDDI Corporation , National Institute of Information and Communications Technology (NICT)   Proposed revision of Draft X.mgv6 (Security management guideline for implementation of IPv6 environment in telecommunications organizations) - Supplement of X.1037 (Clause 9)     Q3/17, Q2/17  
[ 304 ]  
 
2014-09-04 Electronics and Telecommunications Research Institute (ETRI)   A proposal for the sixth draft Recommendation of ITU-T X.sap-5     Q7/17  
[ 303 ]  
(Rev.1-2) 
2014-09-04 Electronics and Telecommunications Research Institute (ETRI)   New work item for enhanced user authentication based on user-centric attribute aggregation     Q7/17, Q10/17  
[ 302 ]  
 
2014-09-04 Corporation for National Research Initiatives   Contribution for Discussion     Q11/17, Q10/17  
[ 301 ]  
 
2014-09-04 China   Proposed comments on X.cc-control     Q8/17  
[ 300 ]  
 
2014-09-04 China   Proposal of new work item -Guidelines for Data Protection in Public Cloud Computing     Q8/17  
[ 299 ]  
 
2014-09-04 United Kingdom   Comments on draft text x.ticvs     Q5/17  
[ 298 ]  
 
2014-09-04 Ministry of Communication and Information Technology   TELECOMMUNICATION INFORMATION SECURITY MANAGEMENT FROM INDONESIA PERSPECTIVE     Q3/17  
[ 297 ]  
 
2014-09-04 China Telecommunications Corporation , ZTE Corporation   Proposed security requirements for SaaS application environment for X.sfcse     Q8/17  
[ 296 ]  
 
2014-09-04 China Telecommunications Corporation , ZTE Corporation   Proposed editorial revision of the Draft recommendation X.sfcse "Security requirements for SaaS application environments"     Q8/17  
[ 295 ]  
 
2014-09-04 China Telecommunications Corporation , ZTE Corporation   Proposed revised characteristics of the maturity model for X.sfcse     Q8/17  
[ 294 ]  
(Rev.1) 
2014-09-04 China Telecommunications Corporation   Proposed editorial revision of the Draft recommendation X.goscc     Q8/17  
[ 293 ]  
(Rev.1) 
2014-09-04 China Telecommunications Corporation   Proposed text of backup section for X.goscc     Q8/17  
[ 292 ]  
(Rev.1) 
2014-09-04 China Telecommunications Corporation   Proposed revised text for X.cspim: Technical Requirements for Countering Instant Messaging Spam (SPIM)     Q5/17  
[ 291 ]  
 
2014-09-03 KDDI Corporation   Proposed revisions to draft ITU-T Recommendation X.1051-rev, "Information security control guidelines based on ISO/IEC 27002 for telecommunications organizations."     Q3/17  
[ 290 ]  
 
2014-09-03 Hitachi, Ltd.   Information on risk analysis and MAC related to proposal of a new work item, Secure software update for ITS communications devices (X.suits)     Q6/17  
[ 289 ]  
 
2014-09-03 China Mobile Communications Corporation   Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE     Q5/17  
[ 288 ]  
 
2014-09-03 China Mobile Communications Corporation   Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     Q5/17  
[ 287 ]  
(Rev.1) 
2014-09-03 China Mobile Communications Corporation   Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks     Q6/17  
[ 286 ]  
(Rev.1) 
2014-09-03 Hitachi, Ltd.   A proposal of a new work item: Simple encryption procedure for IoT device security     Q6/17  
[ 285 ]  
(Rev.1) 
2014-09-03 China Mobile Communications Corporation   The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network     Q7/17  
[ 284 ]  
(Rev.1) 
2014-09-03 China Mobile Communications Corporation   Proposals to protect the PII data in X.gpim     Q3/17  
Results:82 total items.
Result page:  1 - 2 - 3 - 4  - Next Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

 

Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2014-10-24