International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Meeting 2010-04-07 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C (2010-04-07) 

ITU-T SG 17

Security

Study Period 2009

Meeting  from 2010-04-07 to 2010-04-16

held in Switzerland [Geneva]

Other Meetings : 2012-08-29  2012-02-20  2011-08-24  2011-04-11  2010-12-08  2009-09-16  2009-02-11 

Results:20 total items.
Contributions  [ Source: China ]   Documents / Contributions
 
Number 
Received Source Title Questions
[ 277 ]  
 
2010-03-29 CATR, MIIT, China   New Work Item Proposal on security challenge analysis for cloud computing     Q8/17  
[ 266 ]  
 
2010-03-26 China Mobile, China MII, ZTE   User authentication mechanism of X.p2p-3     Q7/17  
[ 265 ]  
 
2010-03-26 MIIT, China   Updated text of X.msec-6: Overview aspects of mobile phones     Q6/17  
[ 264 ]  
 
2010-03-26 China Mobile, China MII, ZTE   The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     Q7/17  
[ 263 ]  
 
2010-03-26 MIIT, China   Proposed text in section 7 of X.tcs-1     Q5/17  
[ 262 ]  
 
2010-03-26 MIIT, China   A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG     Q5/17  
[ 261 ]  
 
2010-03-26 China Mobile, China MII, ZTE   Proposed draft Recommendation for X.authi: Authentication Integration in IDM     Q10/17  
[ 260 ]  
 
2010-03-26 China Mobile   Proposed draft Rec. X.ismf, Information security management framework     Q3/17  
[ 259 ]  
 
2010-03-26 MIIT, China   Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"     Q6/17  
[ 258 ]  
 
2010-03-26 MIIT, China   Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks     Q5/17  
[ 257 ]  
 
2010-03-26 China Mobile   Organization and Personnel part in X.ismf     Q3/17  
[ 255 ]  
(Rev.1) 
2010-03-26 MIIT, China   Proposed Application Scenarios to X.giim     Q10/17  
[ 254 ]  
 
2010-03-26 China Mobile, Huawei   Comparing analysis of abnormal traffic system deployment solutions in X.abnot     Q4/17  
[ 253 ]  
 
2010-03-26 MIIT, China   Clarify Some Issues on IdM in the Cloud Computing     Q10/17  
[ 252 ]  
 
2010-03-26 China Mobile, ZTE   Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 251 ]  
 
2010-03-26 ZTE, China Mobile   Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 248 ]  
(Rev.1) 
2010-03-26 Huawei Technologies Co.,Ltd. , China Telecom   Proposal for a new work item on Requirements and Framework of secure dynamic virtual network     Q6/17  
[ 243 ]  
 
2010-03-26 China Mobile   Assets Management in X.ismf     Q3/17  
[ 242 ]  
 
2010-03-26 China Mobile, China MII, ZTE   An analysis of X.authi: Authentication integration between the network and service layers     Q10/17  
[ 241 ]  
 
2010-03-26 China Mobile, Huawei   A solution to solve the repeated clean problem in the abnormal traffic control system deployment     Q4/17  
Results:20 total items.
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

 

Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2014-12-28