Documents Temporaires
(PLEN)
|
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 2689-PLEN ]
|
Technical Corrigendum 1 for Rec. ITU-T X.521 (2008) | ISO/IEC 9594-7:2008
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2688-PLEN ]
|
Technical Corrigendum 4 for Rec. ITU-T X.520 (2005) | ISO/IEC 9594-6:2005
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2687-PLEN ]
|
Technical Corrigendum 2 for Rec. ITU-T X.520 (2008) | ISO/IEC 9594-6:2008
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2686-PLEN ]
|
Technical Corrigendum 3 for Rec. ITU-T X.519 (2005) | ISO/IEC 9594-5:2005
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2685-PLEN ]
|
Technical Corrigendum 2 for Rec. ITU-T X.519 (2008) | ISO/IEC 9594-5:2008
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2684-PLEN ]
|
Technical Corrigendum 4 for Rec. ITU-T X.511 (2005) | ISO/IEC 9594-3:2005
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2683-PLEN ]
|
Technical Corrigendum 2 for Rec. ITU-T X.511 (2008) | ISO/IEC 9594-3:2008
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2682-PLEN ]
|
Technical Corrigendum 4 for REc. ITU-T X.509 (2005) | ISO/IEC 9594-8:2005
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2681-PLEN ]
|
Technical Corrigendum 2 for Rec. ITU-T X.509 (2008) | ISO/IEC 9594-8:2008
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2680-PLEN ]
|
Technical Corrigendum 4 for Rec. ITU-T X.501 (2005) | ISO/IEC 9594-2:2005
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2679-PLEN ]
|
Technical Corrigendum 2 for Rec. ITU-T X.501 (2008) | ISO/IEC 9594-2:2008
|
Rapporteur Q11/17
|
Q11/17
|
2012-02-27 |
|
[ 2678-PLEN ]
|
Report of Collaborative meeting ISO/IEC/ JTC 1/SC 6/WG 8 and ITU-T Q11/17 Guangzhou February 20-24 2012
|
Editor
|
Q11/17
|
2012-02-27 |
|
[ 2677-PLEN ]
|
Draft text of X.gsiiso : Guidelines on security of the individual information service for operators
|
Editors
|
Q2/17
|
2012-02-27 |
|
[ 2676-PLEN ]
(Rev.1) |
Draft Recommendation ITU-T X.sgsm, Information security management guidelines for small and medium-sized telecommunication organizations
|
Editor
|
Q3/17
|
2012-02-27 |
|
[ 2675-PLEN ]
(Rev.1) |
Executive summary for this SG 17 meeting
|
Vice Chairman of SG 17
|
QALL/17
|
2012-02-27 |
|
[ 2674-PLEN ]
|
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Editors
|
Q4/17
|
2012-02-27 |
|
[ 2673-PLEN ]
|
Specific needs for draft Recommendation ITU-T X.gpim, PII management guidelines for telecommunication organizations
|
Editors
|
Q3/17
|
2012-02-27 |
|
[ 2672-PLEN ]
|
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Editors
|
Q4/17
|
2012-02-27 |
|
[ 2671-PLEN ]
|
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Editors
|
Q4/17
|
2012-02-27 |
|
[ 2670-PLEN ]
|
The 4th revised text for Recommendation ITU-T X.iptvsec-6: Framework for the downloadable service and content protection system in the mobile IPTV environment
|
Editor
|
Q6/17
|
2012-02-27 |
|
[ 2669-PLEN ]
(Rev.1) |
Report of the WTSA-12 preparation meetings
|
Vice-chairman of SG 17 and Chairman of WP 2/17
|
QALL/17
|
2012-02-27 |
|
[ 2668-PLEN ]
(Rev.1) |
Draft Recommendation X.abnot: Abnormal traffic detection and control guideline for telecommunication network
|
Editors
|
Q4/17
|
2012-02-27 |
|
[ 2667-PLEN ]
|
Draft Recommendation on X.unsec-1: Security requirement and framework of ubiquitous networking
|
Editors
|
Q6/17
|
2012-02-26 |
|
[ 2666-PLEN ]
(Rev.1-3) |
Revised Question text for D/17 (Cybersecurity)
|
Rapporteur Q4/17
|
Q4/17
|
2012-02-26 |
|
[ 2665-PLEN ]
|
Withdrawn
|
N/A
|
N/A
|
2012-02-26 |
|
[ 2664-PLEN ]
(Rev.1-3) |
OLS - LS to 3GPP SA3 on the management of the infected terminals in mobile networks
|
ITU-T SG 17
|
Q6/17
|
2012-02-26 |
|
[ 2663-PLEN ]
(Rev.1-4) |
OLS - LS on the management of the infected terminals in mobile networks
|
ITU-T SG 17
|
Q6/17
|
2012-02-26 |
|
[ 2662-PLEN ]
(Rev.1-4) |
Template to describe a proposed new ITU-T Recommendation on guidelines on the management of infected terminals in mobile networks
|
Associate Rapporteur Q6/17
|
Q6/17
|
2012-02-26 |
|
[ 2661-PLEN ]
(Rev.1-4) |
Proposed new Correspondence Group on PROVIDING CONFIDENCE AND SECURITY IN THE USE OF TELECOMMUNICATIONs/ICT WITHIN INDUSTRIAL SYSTEMS
|
Rapporteur Q2/17
|
QALL/17, Q2/17
|
2012-02-26 |
|
[ 2660-PLEN ]
(Rev.1-2) |
Report of the first session on Child Online Protection
|
Convener, CG on COP
|
QALL/17
|
2012-02-26 |
|
[ 2659-PLEN ]
|
Text of DTR 29144, The use of biometric technology in commercial Identity Management applications and processes
|
ITU-T liaison officer to JTC 1
|
Q9/17, Q10/17
|
2012-02-26 |
|
[ 2658-PLEN ]
|
Mapping of Recommendations to Questions
|
Rapporteur Q13/17
|
QALL/17, Q13/17
|
2012-02-26 |
|
[ 2657-PLEN ]
(Rev.1) |
OLS - Response to the liaison statement on survey for IoT Standards Roadmap
|
ITU-T SG 17
|
Q6/17
|
2012-02-26 |
|
[ 2656-PLEN ]
(Rev.1) |
OLS - Report to TSAG from SG 17 as the lead study group on languages and description techniques
|
ITU-T SG 17
|
Q14/17, Q13/17, Q12/17
|
2012-02-26 |
|
[ 2655-PLEN ]
|
The second draft Recommendation of ITU-T X.sap-5
|
Editor
|
Q7/17
|
2012-02-26 |
|
[ 2654-PLEN ]
|
OLS - LS Response on ISO/IEC 3rd CD 29191
|
ITU-T SG 17
|
Q7/17
|
2012-02-26 |
|
[ 2653-PLEN ]
|
Threats and security requirements for enhanced web based telecommunication service
|
Editor
|
Q7/17
|
2012-02-26 |
|
[ 2652-PLEN ]
|
Information and actions from the Management Group of the MoU on e-business
|
ITU-T representative to the MoU/MG on e-business
|
Q9/17, Q4/17
|
2012-02-26 |
|
[ 2651-PLEN ]
|
Wording for new Q.Q/17
|
Rapporteur Q1/17
|
Q1/17
|
2012-02-24 |
|
[ 2650-PLEN ]
(Rev.1-2) |
OLS - Liaison Statement on discovery of identity management (X.discovery)
|
ITU-T SG 17
|
Q10/17
|
2012-02-24 |
|
[ 2649-PLEN ]
|
Report on joint meeting on Video Information Systems
|
Rapporteur Q1/17
|
Q6/17, Q2/17, Q1/17
|
2012-02-24 |
|
[ 2648-PLEN ]
(Rev.1-5) |
New work item ITU-T Recommendation X.vissec
|
Editor
|
Q6/17, Q2/17, Q1/17
|
2012-02-24 |
|
[ 2647-PLEN ]
(Rev.1-2) |
Revised Question text for C/17 (Telecommunications information security management)
|
Rapporteur Q3/17
|
Q3/17
|
2012-02-24 |
|
[ 2646-PLEN ]
(Rev.1-5) |
Proposed text for new Q.B/17 continuation of Q2/17
|
Rapporteur Q2/17
|
Q2/17
|
2012-02-24 |
|
[ 2645-PLEN ]
(Rev.1) |
Proposal for cloud security activities in SG17
|
Chair of the joint session on cloud security
,
(vice-chair of SG17)
|
QALL/17
|
2012-02-24 |
|
[ 2644-PLEN ]
(Rev.1) |
Text of Recommendation ITU-T X.iptvsec-4: Algorithm selection scheme for service and content protection (SCP) descrambling (for consent)
|
Editors
|
Q6/17
|
2012-02-24 |
|
[ 2643-PLEN ]
|
The 4th revised text on draft Recommendation ITU-T X.iptvsec-8: Virtual machine-based security platform for renewable IPTV service and content protection (SCP)
|
Editors
|
Q6/17
|
2012-02-24 |
|
[ 2642-PLEN ]
(Rev.1-2) |
OLS - LS response on development of two Draft New Recommendations on CRS network protocol and CRS pairing protocol specifications
|
ITU-T SG 17
|
Q7/17, Q6/17
|
2012-02-24 |
|
[ 2641-PLEN ]
(Rev.1) |
Report of Ad-hoc meeting
|
Chair Ad-hoc group on X.1037
|
Q2/17
|
2012-02-24 |
|
[ 2640-PLEN ]
|
Baseline document of X.p2p-4: Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks
|
Editor of X.p2p-4
|
Q7/17
|
2012-02-24 |
Resultats:512 documents Résultats :
Précédent -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):