Union Internationale des Télécommunications   UIT
English  Español
 
Plan du site Contactez-nous Copie Imprimable
  Page d'accueil : UIT-T : SG 17 : Contributions  Ajoutés récemment -  Recherche de documents de réunion
   
UIT-T SG 17  C 

UIT-T SG 17

Sécurité

Période d'études 2009

Resultats:164 documents
Résultats :  1 - 2 - 3 - 4  - Suivant Next
Contributions  [ Source: China ]   Documents / Contributions
 
Numéro 
Titre Source AI/Question
Date
[ 752 ]  
(Rev.1) 
Proposed revised text for X.gssiso     China , China Unicom   Q2/17   2012-08-16
[ 717 ]  
 
Contribution for X.abnot(Inline Control Latency Problem)     China Unicom   Q4/17   2012-08-16
[ 716 ]  
 
Contribution for X.gsiiso (Security Objectives)     China Unicom   Q2/17   2012-08-16
[ 715 ]  
 
Contribution for X.gsiiso(Security Requirements)     China Unicom   Q2/17   2012-08-16
[ 713 ]  
 
Draft text of Recommendation ITU-T X.ccsec: High-level Security Framework for Cloud Computing     China , China Telecommunications Corporation , Microsoft Corporation , ZTE Corporation   Q8/17   2012-08-16
[ 712 ]  
 
Contribution for X.gsiiso (Functional Parts and Service Procedures)     China Unicom   Q2/17   2012-08-16
[ 711 ]  
 
Contribution for X.gsiiso(Relationship between User, Pipe and Content)     China Unicom   Q2/17   2012-08-16
[ 703 ]  
(Rev.1) 
Proposed text for chapter 8 of X.goscc     China Telecommunications Corporation   Q8/17   2012-08-16
[ 691 ]  
 
Proposed Edits to clause 9&10 in X.ccsec     China , China Mobile Communications Corporation   Q8/17   2012-08-15
[ 690 ]  
 
X.abnot: Abnormal traffic detection and control guideline for telecommunication network     China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation   Q4/17   2012-08-15
[ 689 ]  
 
1st Draft: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2012-08-15
[ 688 ]  
 
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2012-08-15
[ 687 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 2.     China Mobile Communications Corporation   Q10/17   2012-08-15
[ 686 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 1.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-08-15
[ 685 ]  
 
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-08-15
[ 675 ]  
(Rev.1) 
Proposed text for X.ccsec describing workflow.     China , Microsoft Corporation , ZTE Corporation   Q8/17   2012-08-14
[ 658 ]  
 
Proposed revised text for X.ccsec     China   Q8/17   2012-02-08
[ 657 ]  
 
Proposed revised text for clause 10 of X.gsiiso     China   Q2/17   2012-02-08
[ 656 ]  
 
Proposed revised text for clause 9 of X.gsiiso     China   Q2/17   2012-02-08
[ 654 ]  
 
Proposed revised text for clause 8.3 of X.gsiiso     China   Q2/17   2012-02-08
[ 653 ]  
 
Proposed revised text for clause 8.2 of X.gsiiso     China   Q2/17   2012-02-08
[ 652 ]  
 
Proposed revised text for clause 8.1 of X.gsiiso     China   Q2/17   2012-02-08
[ 651 ]  
 
Proposed text for clause 8.1 of X.ccsec     China   Q8/17   2012-02-08
[ 598 ]  
 
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China , China Unicom   Q5/17   2012-02-07
[ 597 ]  
 
Comments on X.ics: A practical reference model for countering email spam using botnet information     China   Q5/17   2012-02-07
[ 596 ]  
 
Proposal to establish a tutorial mechanism for new technologies     China   QALL/17   2012-02-07
[ 595 ]  
 
Updated text of X.msec-6: Security aspects of smartphones     China   Q6/17   2012-02-07
[ 594 ]  
 
Proposal on security requirements of digital distribution platforms of X.msec-6     China   Q6/17   2012-02-07
[ 593 ]  
 
Updated text of X.oacms: Overall aspects of countering mobile messaging spam     China   Q5/17   2012-02-07
[ 592 ]  
 
Proposal on changing the title name of X.msec-6 back to smartphone     China , China Unicom   Q6/17   2012-02-07
[ 589 ]  
 
Security Protection of Customer Information in Telecom Operators     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-02-07
[ 588 ]  
 
Authentication result transfer based on encrypted cookie for WLAN scenario     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 587 ]  
 
Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2012-02-07
[ 586 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 585 ]  
 
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 584 ]  
 
A Draft of Technology Involved in Countering Voice Spam-X.ticvs     China Mobile Communications Corporation   Q5/17   2012-02-07
[ 583 ]  
 
Authentication integration solution for WLAN scenario in X.authi.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 575 ]  
(Rev.1) 
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets     China Unicom   Q7/17   2012-02-07
[ 566 ]  
 
Proposed text for security guidelines chapter of X.ccsec     China Telecommunications Corporation   Q8/17   2012-02-06
[ 565 ]  
 
Proposed text for security challenges chapter of X.ccsec     China Telecommunications Corporation   Q8/17   2012-02-06
[ 564 ]  
 
Proposed new work item on Requirements and framework of operational security for Cloud Computing     China , China Telecommunications Corporation , ZTE Corporation   Q8/17   2012-02-06
[ 560 ]  
(Rev.1-2) 
Proposal on new appendix for X.msec-6     China , China Unicom   Q6/17   2012-02-06
[ 559 ]  
(Rev.1) 
The security threats of disclosure and congestion for ubiquitous networking     China Unicom   Q6/17   2012-02-06
[ 558 ]  
(Rev.1) 
The security threats of eavesdropping and tamper for ubiquitous networking     China Unicom   Q6/17   2012-02-06
[ 557 ]  
(Rev.1) 
The security threats of Denial of Service and abuse for ubiquitous networking     China Unicom   Q6/17   2012-02-06
[ 553 ]  
 
Proposed a chapter on SaaS levels for X.sfcse     China Telecommunications Corporation   Q8/17   2012-02-02
[ 552 ]  
(Rev.1-2) 
Proposed revised baseline text for X.sfcse     China Telecommunications Corporation   Q8/17   2012-02-02
[ 546 ]  
 
Propose content re-organization for X.srfctse     China , ZTE Corporation   Q8/17   2011-08-16
[ 542 ]  
(Rev.1) 
Proposed text for clause 8.3 of X.ccsec     China   Q8/17   2011-08-11
[ 541 ]  
(Rev.1) 
Proposed revised text for X.ccsec     China   Q8/17   2011-08-11
Resultats:164 documents
Résultats :  1 - 2 - 3 - 4  - Suivant Next
 
Téléchargement de multiples documents: Cocher les cases correspondant aux documents sélectionnés, puis appuyer sur "Télécharger"
   
 
Préférences utilisateur: 
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):
Pages de navigation HTML  
Formats  + Autres formats
Langues (maximum 2)  + Multilingue 
(E: Anglais - F: Français - S: Espagnol - A: Arabe - C: Chinois - R: Russe)
Début de page -  Commentaires -  Contactez-nous -  Droits d'auteur © UIT 2008 Tous droits réservés
Contact pour cette page :  TSB EDH
Mis à jour le : 2016-12-4