Union Internationale des Télécommunications   UIT
English  Español
 
Plan du site Contactez-nous Copie Imprimable
  Page d'accueil : UIT-T : SG 17 : Contributions  Ajoutés récemment -  Recherche de documents de réunion
   
UIT-T SG 17  C 

UIT-T SG 17

Sécurité

Période d'études 2009

Resultats:40 documents
Contributions  [ Questions: Q2/17 ]   Documents / Contributions
 
Numéro 
Date Source Titre Questions
[ 753 ]  
(Rev.1) 
2012-08-16 KDDI Corporation , National Institute of Information and Communications Technology   Comments on draft IPv6 Security Guideline for Telecommunications     Q2/17  
[ 752 ]  
(Rev.1) 
2012-08-16 China , China Unicom   Proposed revised text for X.gssiso     Q2/17  
[ 716 ]  
 
2012-08-16 China Unicom   Contribution for X.gsiiso (Security Objectives)     Q2/17  
[ 715 ]  
 
2012-08-16 China Unicom   Contribution for X.gsiiso(Security Requirements)     Q2/17  
[ 712 ]  
 
2012-08-16 China Unicom   Contribution for X.gsiiso (Functional Parts and Service Procedures)     Q2/17  
[ 711 ]  
 
2012-08-16 China Unicom   Contribution for X.gsiiso(Relationship between User, Pipe and Content)     Q2/17  
[ 706 ]  
 
2012-08-16 ZTE Corporation   Introduction of Test Access Point and Optical Splitter     Q2/17  
[ 693 ]  
 
2012-08-15 Russian Federation   Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks for determination     Q2/17  
[ 692 ]  
 
2012-08-15 Russian Federation   Draft Recommendation of the ITU-T X.ncns-1 «Guidance for creating National IP-based public network security center for developing countries» for determination     Q2/17  
[ 678 ]  
 
2012-08-15 KDDI Corporation , National Institute of Information and Communications Technology (NICT)   Draft text of X.mgv6 (Security management guideline for implementation of IPv6 environment in telecommunications organizations) - Supplement of X.ipv6-secguide     Q3/17, Q2/17  
[ 657 ]  
 
2012-02-08 China   Proposed revised text for clause 10 of X.gsiiso     Q2/17  
[ 656 ]  
 
2012-02-08 China   Proposed revised text for clause 9 of X.gsiiso     Q2/17  
[ 654 ]  
 
2012-02-08 China   Proposed revised text for clause 8.3 of X.gsiiso     Q2/17  
[ 653 ]  
 
2012-02-08 China   Proposed revised text for clause 8.2 of X.gsiiso     Q2/17  
[ 652 ]  
 
2012-02-08 China   Proposed revised text for clause 8.1 of X.gsiiso     Q2/17  
[ 642 ]  
(Rev.1) 
2012-02-07 Canada   Comments on draft Recommendation X.OVAL     Q4/17, Q2/17  
[ 641 ]  
(Rev.1) 
2012-02-07 Canada   Comments on draft Recommendation X.xccdf     Q4/17, Q2/17  
[ 635 ]  
(Rev.1) 
2012-02-07 Canada   Comments on draft Recommendation X.1037     Q2/17  
[ 634 ]  
(Rev.1) 
2012-02-07 United States   Three principles for any ITU-T Child Online Protection work     Q2/17  
[ 633 ]  
(Rev.1) 
2012-02-07 United States   US edits to draft Recommendation X.1037 in response to Circular 228     Q2/17  
[ 625 ]  
 
2012-02-07 Russian Federation   Coordinating Activity in Cloud Computing Security     Q2/17  
[ 612 ]  
 
2012-02-07 KDDI Corporation , National Institute of Information and Communications Technology (NICT)   Comments on draft IPv6 Security Guideline for Telecommunications     Q2/17  
[ 600 ]  
 
2012-02-07 United Kingdom   UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks     Q2/17  
[ 517 ]  
(Rev.1) 
2011-08-11 KDDI Corporation , National Institute of Information and Communications Technology   Technical security guideline on deploying IPv6     Q3/17, Q2/17  
[ 454 ]  
 
2011-03-30 NICT , KDDI Corporation   Proposal of the creation of a new work item "technical security guideline on deploying IPv6"     Q2/17  
[ 422 ]  
 
2011-03-30 CATR, MIIT, China   Propose draft text for X.gsiiso: Guidelines on security of the individual information service for operators     Q2/17  
[ 379 ]  
 
2011-03-24 Administration of the Russian Federation   Draft Recommendation ITU-T X.rev, Architectural systems for security controls for preventing fraudulent activities in public carrier networks     Q2/17  
[ 377 ]  
 
2011-03-25 Administration of the Russian Federation   Heterarchic architecture for secure distributed service networks     Q7/17, Q2/17, Q10/17  
[ 375 ]  
 
2011-03-24 Administration of the Russian Federation   Draft ITU-T Recommendation X.ncns-1, National IP-based public network security center for developing countries     Q2/17  
[ 370 ]  
 
2010-11-29 CATR, MIIT, China   Revised text of X.gsiiso : Guidelines on security of the individual information service for operators     Q2/17  
[ 346 ]  
 
2010-11-26 Korea (Republic of)   Draft text of Recommendation ITU-T X.1034 (revised) for consent     Q2/17  
[ 330 ]  
 
2010-11-26 UK   Direction on Studies related to Revenue Assurance     Q2/17  
[ 313 ]  
 
2010-11-25 China Unicom   Proposed modification to X.interfaces     Q2/17  
[ 285 ]  
 
2010-10-11 France Telecom Orange   Comments on draft Rec. ITU-T X.1032 (COM 17-R15) under TAP     Q2/17  
[ 220 ]  
 
2010-03-26 Korea (Republic of)   A proposal for the 3rd draft text of revised Recommendation ITU-T X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network     Q2/17  
[ 130 ]  
 
2009-09-04 Korea (Republic of)   Proposal for the 2nd draft text for revised Recommendation X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network     Q2/17  
[ 112 ]  
 
2009-09-04 Germany   Comments on draft Recommendation X.interfaces     Q2/17  
[ 89 ]  
 
2009-08-31 Telecommunications Administration of Russian Federation   Proposal of new work item about the creation the basic rules to create the system to protect TELCO from fraud and revenue leakage. "Revenue leakage protection"     Q2/17, Q1/17  
[ 53 ]  
 
2009-02-02 Korea   Proposal for the first draft text of Recommendation X.1034, Amd. 1 : Guideline on extensible authentication protocol based authentication and key management in a data communication network     Q2/17  
[ 5 ]  
 
2009-02-02 China MIIT , China Mobile   Proposal for new work item on the guide of security of the individual information service for operators     Q2/17  
Resultats:40 documents
 
Téléchargement de multiples documents: Cocher les cases correspondant aux documents sélectionnés, puis appuyer sur "Télécharger"
   
 
Préférences utilisateur: 
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):
Pages de navigation HTML  
Formats  + Autres formats
Langues (maximum 2)  + Multilingue 
(E: Anglais - F: Français - S: Espagnol - A: Arabe - C: Chinois - R: Russe)
Début de page -  Commentaires -  Contactez-nous -  Droits d'auteur © UIT 2008 Tous droits réservés
Contact pour cette page :  TSB EDH
Mis à jour le : 2016-8-25