International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C 

ITU-T SG 17

Security

Study Period 2009

Results:61 total items.
Result page:  1 - 2  - Next Next
Contributions  [ Source: ZTE ]   Documents / Contributions
 
Number 
Title Source AI/Question
Date
[ 713 ]  
 
Draft text of Recommendation ITU-T X.ccsec: High-level Security Framework for Cloud Computing     China , China Telecommunications Corporation , Microsoft Corporation , ZTE Corporation   Q8/17   2012-08-16
[ 706 ]  
 
Introduction of Test Access Point and Optical Splitter     ZTE Corporation   Q2/17   2012-08-16
[ 704 ]  
 
Proposed text for x.ccsec clause 10     ZTE Corporation   Q8/17   2012-08-16
[ 690 ]  
 
X.abnot: Abnormal traffic detection and control guideline for telecommunication network     China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation   Q4/17   2012-08-15
[ 686 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 1.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-08-15
[ 685 ]  
 
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-08-15
[ 675 ]  
(Rev.1) 
Proposed text for X.ccsec describing workflow.     China , Microsoft Corporation , ZTE Corporation   Q8/17   2012-08-14
[ 667 ]  
(Rev.1) 
Proposed Terms of Reference for the Correspondence Group on X.ccsec     Microsoft Corporation , ZTE Corporation   Q8/17   2012-08-07
[ 589 ]  
 
Security Protection of Customer Information in Telecom Operators     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-02-07
[ 588 ]  
 
Authentication result transfer based on encrypted cookie for WLAN scenario     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 583 ]  
 
Authentication integration solution for WLAN scenario in X.authi.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 578 ]  
(Rev.1) 
Proposal on security requirements of ubiquitous networking in NGN     ZTE Corporation   Q6/17   2012-02-07
[ 577 ]  
(Rev.1) 
Revised text for chapter 14 in draft X.srfctse     ZTE Corporation   Q8/17   2012-02-07
[ 576 ]  
 
Propose a chapter on cloud security for X.srfctse     ZTE Corporation   Q8/17   2012-02-07
[ 568 ]  
 
Propose the requirement of cloud storage security for X.srfctse     ZTE Corporation   Q8/17   2012-02-07
[ 564 ]  
 
Proposed new work item on Requirements and framework of operational security for Cloud Computing     China , China Telecommunications Corporation , ZTE Corporation   Q8/17   2012-02-06
[ 546 ]  
 
Propose content re-organization for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-16
[ 534 ]  
(Rev.1) 
Propose the requirement of security assessment for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-11
[ 533 ]  
(Rev.1) 
Propose a chapter on security assessment for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-11
[ 532 ]  
 
Propose a chapter on on-demand security provisioning for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-11
[ 531 ]  
(Rev.1) 
Propose cloud security framework for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-11
[ 530 ]  
(Rev.1) 
Propose the requirement of On-demand security provisioning for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-11
[ 521 ]  
 
A proposal on a use case of resource personalization secure access control     ZTE Corporation   Q6/17   2011-08-11
[ 520 ]  
 
A proposal on security enhancements based on context-aware for ubiquitous networking     ZTE Corporation   Q6/17   2011-08-11
[ 519 ]  
 
Propose to modify the chapter of authorization for X.srfctse     ZTE Corporation   Q8/17   2011-08-11
[ 515 ]  
 
Authentication integration based on authentication gateway in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 514 ]  
 
Authentication integration based on network authentication result transfer in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 508 ]  
 
Proposed draft Recommendation for X.authi: Authentication integration in IDM     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 507 ]  
 
VoIP security mechanism of X.p2p-3     China , China Mobile Communications Corporation , ZTE Corporation   Q7/17   2011-08-10
[ 411 ]  
 
Propose a resource sharing method for X.srfctse     ZTE Corporation   Q8/17   2011-03-29
[ 410 ]  
(Rev.1) 
Propose a chapter on virtualization security for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2011-03-29
[ 409 ]  
(Rev.1) 
A proposal on security model for ubiquitous network     ZTE Corporation , China Unicom   Q6/17   2011-03-29
[ 408 ]  
 
Propose an authorization method for X.srfctse     ZTE Corporation   Q8/17   2011-03-29
[ 328 ]  
 
Propose an authentication method involving Authentication Router for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2010-11-25
[ 327 ]  
 
Propose a federation gateway for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2010-11-25
[ 326 ]  
(Rev.1) 
Proposal for updating "Procedure of security policy distribution" section in X.gpn     ZTE, China Mobile   Q4/17   2010-11-25
[ 325 ]  
 
Proposal for new work item on security requirements and framework of ubiquitous networking     ZTE, China Unicom, China Mobile   Q6/17   2010-11-25
[ 324 ]  
 
A proposal on background, division of security domain and security mechanism regarding security of CTSE     ZTE Corporation, CATR MIIT   Q8/17   2010-11-25
[ 267 ]  
(Rev.1) 
A proposal on studying security requirements and framework of cloud based telecommunication service environment     ZTE Corporation, CATR, MIIT   Q8/17   2010-03-26
[ 266 ]  
 
User authentication mechanism of X.p2p-3     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 264 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 261 ]  
 
Proposed draft Recommendation for X.authi: Authentication Integration in IDM     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 256 ]  
(Rev.1) 
Proposed mechanisms on inter-federation trust establishment for X.giim     ZTE Corporation   Q10/17   2010-03-26
[ 252 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2010-03-26
[ 251 ]  
 
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     ZTE, China Mobile   Q4/17   2010-03-26
[ 242 ]  
 
An analysis of X.authi: Authentication integration between the network and service layers     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 180 ]  
+Corr.1 
Proposed text for section 6 of X.idmgen     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 179 ]  
+Corr.1 
Proposed text for authentication assurance interoperation in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 178 ]  
 
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 177 ]  
 
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
Results:61 total items.
Result page:  1 - 2  - Next Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

Test ITU Translate for automated document translation
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2024-4-20