International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Meeting 2014-01-15 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C (2014-01-15) 

ITU-T SG 17

Security

Study Period 2013

Meeting  from 2014-01-15 to 2014-01-24

held in Switzerland [Geneva]

Other Meetings : 2016-08-29  2016-03-14  2015-09-08  2015-04-08  2014-09-17  2013-08-26  2013-04-17 

Results:69 total items.
Result page:   -  1 - 2  -  Next
Contributions  Documents / Contributions
 
Number 
Title Source AI/Question
Date
[ 201 ]  
 
Proposed modifications to draft X.1051-rev, "Information security management guidelines for telecommunications organizations based on ISO/IEC 27002"     KDDI Corporation   Q3/17   2014-01-02
[ 200 ]  
(Rev.1) 
Final text of draft Recommendation ITU-T X.websec-5: Security framework for web mashup services (for agreement)     Electronics and Telecommunications Research Institute (ETRI)   Q7/17   2014-01-01
[ 199 ]  
(Rev.1) 
Proposal for a new clause about testing and evaluation to X.msec-8     Ministry of Industry and Information Technology (MIIT)   Q6/17   2014-01-01
[ 198 ]  
(Rev.1-2) 
Proposal for a new work item: Security Guidelines for Virtual Network Operator (VNO)     Beijing University of Posts and Telecommunications , China Telecommunications Corporation , Ministry of Industry and Information Technology (MIIT)   Q2/17   2014-01-01
[ 197 ]  
(Rev.1) 
Draft of Survey Questionnaire on Countering Spam     Ministry of Industry and Information Technology (MIIT)   Q5/17   2014-01-01
[ 196 ]  
(Rev.1) 
Proposal for add Section 5.4, the description of "individual information service" in X.gsiiso     China Unicom   Q2/17   2013-12-31
[ 195 ]  
(Rev.1) 
Proposal for X.goscc: Add content for Section 8.6     China Unicom   Q8/17   2013-12-31
[ 194 ]  
(Rev.1) 
Proposal for X.goscc: Add content for Section 8.4     China Unicom   Q8/17   2013-12-31
[ 193 ]  
(Rev.1) 
Proposal for a new work item: Guideline for virtualization security in cloud     China , China Unicom , ZTE Corporation   Q8/17   2013-12-31
[ 192 ]  
(Rev.1) 
Proposal for update Section 10 of X.tfcmm     China Unicom   Q5/17   2013-12-31
[ 191 ]  
(Rev.1) 
Proposal for update Section 9 of X.tfcmm     China Unicom   Q5/17   2013-12-31
[ 190 ]  
(Rev.1) 
Proposal for X.unsec-1: draft for consent     China Unicom , ZTE Corporation   Q6/17   2013-12-31
[ 189 ]  
(Rev.1) 
Proposal for a new work item on "The security requirement framework for smartphones-based botnet"     China Unicom   Q4/17   2013-12-31
[ 188 ]  
(Rev.1) 
Proposed text for configuration management of X.goscc     China Telecommunications Corporation , China   Q8/17   2013-12-31
[ 187 ]  
(Rev.1) 
Proposed text for security monitoring of X.goscc     China Telecommunications Corporation , China   Q8/17   2013-12-31
[ 186 ]  
(Rev.1) 
Proposed revised text for the scope of X.goscc     China Telecommunications Corporation   Q8/17   2013-12-31
[ 185 ]  
(Rev.1) 
Proposed new work item on Technical Requirements for Countering Instant Messaging Spam     China Telecommunications Corporation , China , ZTE Corporation   Q5/17   2013-12-31
[ 184 ]  
(Rev.1) 
Proposed security requirements for X.sfcse     China Telecommunications Corporation   Q8/17   2013-12-31
[ 183 ]  
(Rev.1) 
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2013-12-31
[ 182 ]  
(Rev.1) 
ITU-T x.orf: A proposal for modification of scenarios in Clause 9     Electronics and Telecommunications Research Institute (ETRI)   Q11/17   2013-12-31
[ 181 ]  
(Rev.1) 
ITU-T x.orf: A proposal for modification of requirements in Clause 8     Electronics and Telecommunications Research Institute (ETRI)   Q11/17   2013-12-31
[ 180 ]  
(Rev.1) 
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2013-12-31
[ 179 ]  
(Rev.1) 
X.authi: Guideline to implement the authentication integration of the network layer and the service layer     China Mobile Communications Corporation , China , ZTE Corporation   Q10/17   2013-12-31
[ 178 ]  
(Rev.1) 
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"     China Mobile Communications Corporation   Q3/17   2013-12-31
[ 177 ]  
(Rev.1-3) 
A proposal of new work item : reference monitor for online analytics applications     Electronics and Telecommunications Research Institute (ETRI)   Q7/17   2013-12-31
[ 176 ]  
(Rev.1) 
Effectiveness of ITU's Electronic Collaboration     United States   QALL/17   2013-12-30
[ 175 ]  
(Rev.1) 
Suggestions on WTSA Resolution 52 survey questionnaire on countering spam     United States   QALL/17, Q5/17   2013-12-30
[ 174 ]  
(Rev.1) 
Response to Circular 52, approving several draft new and revised Recommendations     United States   QALL/17   2013-12-30
[ 173 ]  
(Rev.1) 
Response of the United States of America to Circular 57, approving draft new Recommendation ITU-T X.1208     United States   QALL/17   2013-12-30
[ 172 ]  
 
Proposed revisions to draft ITU-T Recommendation X.msec-8: Secure application distribution framework for communication devices     KDDI Corporation   Q6/17   2013-12-30
[ 171 ]  
 
A proposal of new work item: Supplement on cryptographic protocols and its verification     KDDI Corporation   Q7/17, Q1/17   2013-12-30
[ 170 ]  
 
 
Withdrawn
 
N/A     2014-01-13
[ 169 ]  
(Rev.1) 
Proposed modification contribution to draft Recommendation X.IAMT- Identity and Access Management Taxonomy     MBNA Canada   Q10/17   2013-12-23
[ 168 ]  
 
Cybercrime: fight     Société Congolaise des Postes et Télécommunications (SCPT)   Q4/17   2013-12-23
[ 167 ]  
 
Concerns and comments regarding draft Recommendation X.1208     Canada   Q4/17   2013-12-23
[ 166 ]  
 
Cybercrime: creation of a global fund and raising more consumer awareness     African ICT Consumers Network (AICN)   Q4/17   2013-12-09
[ 165 ]  
 
Cybersecurity in developing countries     Dem. Rep. of the Congo   Q5/17, Q4/17   2013-11-30
[ 164 ]  
 
Cybersecurity in developing countries     Dem. Rep. of the Congo   Q6/17, Q4/17, Q10/17   2013-11-30
[ 163 ]  
 
 
Withdrawn
 
N/A     1753-01-01
[ 162 ]  
 
 
Withdrawn
 
N/A     1753-01-01
[ 161 ]  
 
 
Withdrawn
 
N/A     1753-01-01
[ 160 ]  
 
Security - Contribution on Question 4/17 (Cybersecurity) Volume 3     Dem. Rep. of the Congo   Q4/17   2013-11-16
[ 159 ]  
 
 
Withdrawn
 
N/A     2013-11-08
[ 158 ]  
 
 
Withdrawn
 
N/A     1753-01-01
Results:69 total items.
Result page:   -  1 - 2  -  Next
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

Test ITU Translate for automated document translation
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2024-4-23