International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C 

ITU-T SG 17

Security

Study Period 2009

Results:164 total items.
Result page:  Previous -  1 - 2 - 3 - 4  - Next Next
Contributions  [ Source: China ]   Documents / Contributions
 
Number 
Title Source AI/Question
Date
[ 322 ]  
 
Proposed draft Recommendation of X.giim     MIIT, China   Q10/17   2010-11-25
[ 321 ]  
 
Comments on X.ics : Functions and interfaces for countering email spam sent by botnet     MIIT, China   Q5/17   2010-11-25
[ 320 ]  
 
Updated text of X.msec-6: Security aspects of mobile phones     MIIT, China   Q6/17   2010-11-25
[ 319 ]  
 
Proposal for a new work item on Content-based Classification in Messaging Services     MIIT China, China Unicom   Q5/17   2010-11-25
[ 317 ]  
 
Proposal for update to X.oacms     Huawei, China Unicom   Q5/17   2010-11-25
[ 316 ]  
 
Proposal for updated text to X.oacms     Huawei Technologies Co.,Ltd.; China Unicom   Q5/17   2010-11-25
[ 315 ]  
 
Proposal for a new work item on Requirements and Framework of Secure Service Platform in Complex NAT Environments     Huawei Technologies Co., Ltd.; China Telecom; MIIT   Q8/17   2010-11-25
[ 314 ]  
 
Proposal for revised draft text for X.bots : Frameworks for botnet detection and response     China Unicom   Q4/17   2010-11-25
[ 313 ]  
 
Proposed modification to X.interfaces     China Unicom   Q2/17   2010-11-25
[ 312 ]  
 
Proposed text of chapter 6 in X.msec-6     China Unicom   Q6/17   2010-11-25
[ 311 ]  
 
Proposed infrastructure as services for X.ccsec     China Telecom, China   Q8/17   2010-11-25
[ 302 ]  
 
Trust management evaluation criteria of X.p2p-3     China Mobile   Q7/17   2010-11-25
[ 301 ]  
 
Trust management assumption of X.p2p-3     China Mobile   Q7/17   2010-11-25
[ 300 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile   Q7/17   2010-11-25
[ 277 ]  
 
New Work Item Proposal on security challenge analysis for cloud computing     CATR, MIIT, China   Q8/17   2010-03-29
[ 266 ]  
 
User authentication mechanism of X.p2p-3     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 265 ]  
 
Updated text of X.msec-6: Overview aspects of mobile phones     MIIT, China   Q6/17   2010-03-26
[ 264 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 263 ]  
 
Proposed text in section 7 of X.tcs-1     MIIT, China   Q5/17   2010-03-26
[ 262 ]  
 
A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG     MIIT, China   Q5/17   2010-03-26
[ 261 ]  
 
Proposed draft Recommendation for X.authi: Authentication Integration in IDM     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 260 ]  
 
Proposed draft Rec. X.ismf, Information security management framework     China Mobile   Q3/17   2010-03-26
[ 259 ]  
 
Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"     MIIT, China   Q6/17   2010-03-26
[ 258 ]  
 
Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks     MIIT, China   Q5/17   2010-03-26
[ 257 ]  
 
Organization and Personnel part in X.ismf     China Mobile   Q3/17   2010-03-26
[ 255 ]  
(Rev.1) 
Proposed Application Scenarios to X.giim     MIIT, China   Q10/17   2010-03-26
[ 254 ]  
 
Comparing analysis of abnormal traffic system deployment solutions in X.abnot     China Mobile, Huawei   Q4/17   2010-03-26
[ 253 ]  
 
Clarify Some Issues on IdM in the Cloud Computing     MIIT, China   Q10/17   2010-03-26
[ 252 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2010-03-26
[ 251 ]  
 
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     ZTE, China Mobile   Q4/17   2010-03-26
[ 248 ]  
(Rev.1) 
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network     Huawei Technologies Co.,Ltd. , China Telecom   Q6/17   2010-03-26
[ 243 ]  
 
Assets Management in X.ismf     China Mobile   Q3/17   2010-03-26
[ 242 ]  
 
An analysis of X.authi: Authentication integration between the network and service layers     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 241 ]  
 
A solution to solve the repeated clean problem in the abnormal traffic control system deployment     China Mobile, Huawei   Q4/17   2010-03-26
[ 180 ]  
+Corr.1 
Proposed text for section 6 of X.idmgen     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 179 ]  
+Corr.1 
Proposed text for authentication assurance interoperation in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 178 ]  
 
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 177 ]  
 
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 176 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 175 ]  
 
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 174 ]  
+Corr.1 
Proposed text for trust establishment in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 165 ]  
 
Proposed use cases for X.tb-ucr     CATR, MIIT, China   Q4/17   2009-09-07
[ 164 ]  
 
Updated draft text on Recommendation X.tb-ucc: Traceback use cases and capabilities     CATR, MIIT, China   Q4/17   2009-09-07
[ 162 ]  
+Corr.1 
Proposal for a new work item on overview of security threats to and security mechanisms for smart phones     MIIT, China   Q6/17   2009-09-07
[ 161 ]  
 
Comments on X.fcsip, Framework for countering spam in IP-based multimedia applications     MIIT, China   Q5/17   2009-09-07
[ 160 ]  
 
Proposed a new work item on Generic IdM interoperability mechanisms     MIIT, China   Q10/17   2009-09-07
[ 105 ]  
 
Basic concept for authentication mechanism of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2009-09-03
[ 104 ]  
 
Draft Recommendation X.abnot: Abnormal traffic detection and control guideline for telecommunication network     China Mobile, Huawei   Q4/17   2009-09-03
[ 103 ]  
 
Draft Recommendation X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2009-09-03
[ 102 ]  
 
Proposed draft Recommendation. X.ismf, Information security management framework     China Mobile   Q3/17   2009-09-03
Results:164 total items.
Result page:  Previous -  1 - 2 - 3 - 4  - Next Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

Test ITU Translate for automated document translation
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2024-9-22