Contribuciones
[ Origen: China ] |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 255 ]
(Rev.1) |
Proposed Application Scenarios to X.giim
|
MIIT, China
|
Q10/17
|
2010-03-26 |
|
[ 254 ]
|
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 253 ]
|
Clarify Some Issues on IdM in the Cloud Computing
|
MIIT, China
|
Q10/17
|
2010-03-26 |
|
[ 252 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2010-03-26 |
|
[ 251 ]
|
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
ZTE, China Mobile
|
Q4/17
|
2010-03-26 |
|
[ 248 ]
(Rev.1) |
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network
|
Huawei Technologies Co.,Ltd.
,
China Telecom
|
Q6/17
|
2010-03-26 |
|
[ 243 ]
|
Assets Management in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 242 ]
|
An analysis of X.authi: Authentication integration between the network and service layers
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 241 ]
|
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 180 ]
+Corr.1 |
Proposed text for section 6 of X.idmgen
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 179 ]
+Corr.1 |
Proposed text for authentication assurance interoperation in X.idm-ifa
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 178 ]
|
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 177 ]
|
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 176 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 175 ]
|
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 174 ]
+Corr.1 |
Proposed text for trust establishment in X.idm-ifa
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 165 ]
|
Proposed use cases for X.tb-ucr
|
CATR, MIIT, China
|
Q4/17
|
2009-09-07 |
|
[ 164 ]
|
Updated draft text on Recommendation X.tb-ucc: Traceback use cases and capabilities
|
CATR, MIIT, China
|
Q4/17
|
2009-09-07 |
|
[ 162 ]
+Corr.1 |
Proposal for a new work item on overview of security threats to and security mechanisms for smart phones
|
MIIT, China
|
Q6/17
|
2009-09-07 |
|
[ 161 ]
|
Comments on X.fcsip, Framework for countering spam in IP-based multimedia applications
|
MIIT, China
|
Q5/17
|
2009-09-07 |
|
[ 160 ]
|
Proposed a new work item on Generic IdM interoperability mechanisms
|
MIIT, China
|
Q10/17
|
2009-09-07 |
|
[ 105 ]
|
Basic concept for authentication mechanism of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
|
[ 104 ]
|
Draft Recommendation X.abnot: Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile, Huawei
|
Q4/17
|
2009-09-03 |
|
[ 103 ]
|
Draft Recommendation X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
|
[ 102 ]
|
Proposed draft Recommendation. X.ismf, Information security management framework
|
China Mobile
|
Q3/17
|
2009-09-03 |
|
[ 101 ]
|
Proposal of new work item - Integration of the network layer authentication and the service layer authentication
|
China Mobile, China MII, ZTE
|
Q10/17
|
2009-09-03 |
|
[ 79 ]
|
Proposed management capabilities for X.tr-ucc1
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 78 ]
|
Proposed functional capabilities for X.tb-ucc
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 77 ]
|
Proposed use cases for X.tb-ucr
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 76 ]
|
Proposed modification of X.tb-ucc for clause 8.1
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 75 ]
|
Proposed modification of X.tb-ucc for clause 7.2
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 74 ]
|
Proposed modification of X.tb-ucc for chapter 6
|
CATR, MIIT, China
|
Q4/17
|
2009-02-03 |
|
[ 16 ]
|
Proposed draft Rec.X.p2p-3, Security guideline of P2P-based telecommunication network
|
China Mobile
,
MII China
,
ZTE
|
Q7/17
|
2009-01-29 |
|
[ 15 ]
|
Proposed draft Rec.X.abnot, Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile
,
Huawei
,
ZTE
|
Q4/17
|
2009-01-29 |
|
[ 14 ]
(Rev.1) |
Proposal for procedure of abnormal traffic detection and control system
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 13 ]
(Rev.1) |
Proposal for framework of abnormal traffic detection and control system
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 12 ]
|
Proposal on general policy profile for network security
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 6 ]
|
Proposed modification for X.tcs-1: Interactive countering spam gateway system
|
MIIT, China
|
Q5/17
|
2009-01-28 |
|
[ 5 ]
|
Proposal for new work item on the guide of security of the individual information service for operators
|
China MIIT
,
China Mobile
|
Q2/17
|
2009-02-02 |
Resultados :164 documentos Resultados :
Anterior -
1 -
2 -
3 -
4
-
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):