International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C 

ITU-T SG 17

Security

Study Period 2009

Results:60 total items.
Result page:  1 - 2  - Next Next
Contributions  [ Source: China Mobile ]   Documents / Contributions
 
Number 
Received Source Title Questions
[ 691 ]  
 
2012-08-15 China , China Mobile Communications Corporation   Proposed Edits to clause 9&10 in X.ccsec     Q8/17  
[ 690 ]  
 
2012-08-15 China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation   X.abnot: Abnormal traffic detection and control guideline for telecommunication network     Q4/17  
[ 689 ]  
 
2012-08-15 China Mobile Communications Corporation   1st Draft: Guidelines on the management of infected terminals in mobile networks     Q6/17  
[ 688 ]  
 
2012-08-15 China Mobile Communications Corporation   Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     Q5/17  
[ 687 ]  
 
2012-08-15 China Mobile Communications Corporation   Authentication integration solution for IMS scenario in X.authi - part 2.     Q10/17  
[ 686 ]  
 
2012-08-15 China Mobile Communications Corporation , ZTE Corporation   Authentication integration solution for IMS scenario in X.authi - part 1.     Q10/17  
[ 685 ]  
 
2012-08-15 China Mobile Communications Corporation , ZTE Corporation   Analysis of the mobile telecom network specific PII(personally identifiable information) security protection     Q3/17  
[ 589 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Security Protection of Customer Information in Telecom Operators     Q3/17  
[ 588 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication result transfer based on encrypted cookie for WLAN scenario     Q10/17  
[ 587 ]  
 
2012-02-07 China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Interface of the abnormal traffic detection and control system     Q4/17  
[ 586 ]  
 
2012-02-07 China Mobile Communications Corporation   Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     Q6/17  
[ 585 ]  
 
2012-02-07 China Mobile Communications Corporation   Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     Q6/17  
[ 584 ]  
 
2012-02-07 China Mobile Communications Corporation   A Draft of Technology Involved in Countering Voice Spam-X.ticvs     Q5/17  
[ 583 ]  
 
2012-02-07 China Mobile Communications Corporation , ZTE Corporation   Authentication integration solution for WLAN scenario in X.authi.     Q10/17  
[ 515 ]  
 
2011-08-10 China Mobile Communications Corporation , ZTE Corporation   Authentication integration based on authentication gateway in X.authi     Q10/17  
[ 514 ]  
 
2011-08-10 China Mobile Communications Corporation , ZTE Corporation   Authentication integration based on network authentication result transfer in X.authi     Q10/17  
[ 513 ]  
 
2011-08-10 China Mobile Communications Corporation   Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization     Q3/17  
[ 512 ]  
 
2011-08-10 China Mobile Communications Corporation   Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations     Q5/17, Q4/17  
[ 511 ]  
 
2011-08-10 China Mobile Communications Corporation   Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     Q4/17  
[ 510 ]  
 
2011-08-10 China Mobile Communications Corporation   Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection     Q5/17  
[ 509 ]  
 
2011-08-10 China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Performance and Interface of the abnormal traffic detection and control system     Q4/17  
[ 508 ]  
 
2011-08-10 China Mobile Communications Corporation , ZTE Corporation   Proposed draft Recommendation for X.authi: Authentication integration in IDM     Q10/17  
[ 507 ]  
 
2011-08-10 China , China Mobile Communications Corporation , ZTE Corporation   VoIP security mechanism of X.p2p-3     Q7/17  
[ 410 ]  
(Rev.1) 
2011-03-29 ZTE Corporation, China Mobile   Propose a chapter on virtualization security for X.srfctse     Q8/17  
[ 328 ]  
 
2010-11-25 ZTE Corporation, China Mobile   Propose an authentication method involving Authentication Router for X.srfctse     Q8/17  
[ 327 ]  
 
2010-11-25 ZTE Corporation, China Mobile   Propose a federation gateway for X.srfctse     Q8/17  
[ 326 ]  
(Rev.1) 
2010-11-25 ZTE, China Mobile   Proposal for updating "Procedure of security policy distribution" section in X.gpn     Q4/17  
[ 325 ]  
 
2010-11-25 ZTE, China Unicom, China Mobile   Proposal for new work item on security requirements and framework of ubiquitous networking     Q6/17  
[ 302 ]  
 
2010-11-25 China Mobile   Trust management evaluation criteria of X.p2p-3     Q7/17  
[ 301 ]  
 
2010-11-25 China Mobile   Trust management assumption of X.p2p-3     Q7/17  
[ 300 ]  
 
2010-11-25 China Mobile   The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     Q7/17  
[ 266 ]  
 
2010-03-26 China Mobile, China MII, ZTE   User authentication mechanism of X.p2p-3     Q7/17  
[ 264 ]  
 
2010-03-26 China Mobile, China MII, ZTE   The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     Q7/17  
[ 261 ]  
 
2010-03-26 China Mobile, China MII, ZTE   Proposed draft Recommendation for X.authi: Authentication Integration in IDM     Q10/17  
[ 260 ]  
 
2010-03-26 China Mobile   Proposed draft Rec. X.ismf, Information security management framework     Q3/17  
[ 257 ]  
 
2010-03-26 China Mobile   Organization and Personnel part in X.ismf     Q3/17  
[ 254 ]  
 
2010-03-26 China Mobile, Huawei   Comparing analysis of abnormal traffic system deployment solutions in X.abnot     Q4/17  
[ 252 ]  
 
2010-03-26 China Mobile, ZTE   Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 251 ]  
 
2010-03-26 ZTE, China Mobile   Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 243 ]  
 
2010-03-26 China Mobile   Assets Management in X.ismf     Q3/17  
[ 242 ]  
 
2010-03-26 China Mobile, China MII, ZTE   An analysis of X.authi: Authentication integration between the network and service layers     Q10/17  
[ 241 ]  
 
2010-03-26 China Mobile, Huawei   A solution to solve the repeated clean problem in the abnormal traffic control system deployment     Q4/17  
[ 180 ]  
+Corr.1 
2009-09-07 China Mobile, ZTE Corporation   Proposed text for section 6 of X.idmgen     Q10/17  
[ 179 ]  
+Corr.1 
2009-09-07 China Mobile, ZTE Corporation   Proposed text for authentication assurance interoperation in X.idm-ifa     Q10/17  
[ 178 ]  
 
2009-09-07 China Mobile, ZTE   Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 177 ]  
 
2009-09-07 China Mobile, ZTE   Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 176 ]  
 
2009-09-07 China Mobile, ZTE   Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 175 ]  
 
2009-09-07 China Mobile, ZTE   Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     Q4/17  
[ 174 ]  
+Corr.1 
2009-09-07 China Mobile, ZTE Corporation   Proposed text for trust establishment in X.idm-ifa     Q10/17  
[ 105 ]  
 
2009-09-03 China Mobile, China MII, ZTE   Basic concept for authentication mechanism of P2P-based telecommunication network     Q7/17  
Results:60 total items.
Result page:  1 - 2  - Next Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2016-5-2