Union Internationale des Télécommunications   UIT
English  Español
 
Plan du site Contactez-nous Copie Imprimable
  Page d'accueil : UIT-T : SG 17 : Contributions  Ajoutés récemment -  Recherche de documents de réunion
   
UIT-T SG 17  C 

UIT-T SG 17

Sécurité

Période d'études 2009

Resultats:60 documents
Résultats :  1 - 2  - Suivant Next
Contributions  [ Source: China Mobile ]   Documents / Contributions
 
Numéro 
Titre Source AI/Question
Date
[ 691 ]  
 
Proposed Edits to clause 9&10 in X.ccsec     China , China Mobile Communications Corporation   Q8/17   2012-08-15
[ 690 ]  
 
X.abnot: Abnormal traffic detection and control guideline for telecommunication network     China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation   Q4/17   2012-08-15
[ 689 ]  
 
1st Draft: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2012-08-15
[ 688 ]  
 
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2012-08-15
[ 687 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 2.     China Mobile Communications Corporation   Q10/17   2012-08-15
[ 686 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 1.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-08-15
[ 685 ]  
 
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-08-15
[ 589 ]  
 
Security Protection of Customer Information in Telecom Operators     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-02-07
[ 588 ]  
 
Authentication result transfer based on encrypted cookie for WLAN scenario     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 587 ]  
 
Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2012-02-07
[ 586 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 585 ]  
 
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 584 ]  
 
A Draft of Technology Involved in Countering Voice Spam-X.ticvs     China Mobile Communications Corporation   Q5/17   2012-02-07
[ 583 ]  
 
Authentication integration solution for WLAN scenario in X.authi.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 515 ]  
 
Authentication integration based on authentication gateway in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 514 ]  
 
Authentication integration based on network authentication result transfer in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 513 ]  
 
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization     China Mobile Communications Corporation   Q3/17   2011-08-10
[ 512 ]  
 
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations     China Mobile Communications Corporation   Q5/17, Q4/17   2011-08-10
[ 511 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q4/17   2011-08-10
[ 510 ]  
 
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection     China Mobile Communications Corporation   Q5/17   2011-08-10
[ 509 ]  
 
Performance and Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2011-08-10
[ 508 ]  
 
Proposed draft Recommendation for X.authi: Authentication integration in IDM     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 507 ]  
 
VoIP security mechanism of X.p2p-3     China , China Mobile Communications Corporation , ZTE Corporation   Q7/17   2011-08-10
[ 410 ]  
(Rev.1) 
Propose a chapter on virtualization security for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2011-03-29
[ 328 ]  
 
Propose an authentication method involving Authentication Router for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2010-11-25
[ 327 ]  
 
Propose a federation gateway for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2010-11-25
[ 326 ]  
(Rev.1) 
Proposal for updating "Procedure of security policy distribution" section in X.gpn     ZTE, China Mobile   Q4/17   2010-11-25
[ 325 ]  
 
Proposal for new work item on security requirements and framework of ubiquitous networking     ZTE, China Unicom, China Mobile   Q6/17   2010-11-25
[ 302 ]  
 
Trust management evaluation criteria of X.p2p-3     China Mobile   Q7/17   2010-11-25
[ 301 ]  
 
Trust management assumption of X.p2p-3     China Mobile   Q7/17   2010-11-25
[ 300 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile   Q7/17   2010-11-25
[ 266 ]  
 
User authentication mechanism of X.p2p-3     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 264 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 261 ]  
 
Proposed draft Recommendation for X.authi: Authentication Integration in IDM     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 260 ]  
 
Proposed draft Rec. X.ismf, Information security management framework     China Mobile   Q3/17   2010-03-26
[ 257 ]  
 
Organization and Personnel part in X.ismf     China Mobile   Q3/17   2010-03-26
[ 254 ]  
 
Comparing analysis of abnormal traffic system deployment solutions in X.abnot     China Mobile, Huawei   Q4/17   2010-03-26
[ 252 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2010-03-26
[ 251 ]  
 
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     ZTE, China Mobile   Q4/17   2010-03-26
[ 243 ]  
 
Assets Management in X.ismf     China Mobile   Q3/17   2010-03-26
[ 242 ]  
 
An analysis of X.authi: Authentication integration between the network and service layers     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 241 ]  
 
A solution to solve the repeated clean problem in the abnormal traffic control system deployment     China Mobile, Huawei   Q4/17   2010-03-26
[ 180 ]  
+Corr.1 
Proposed text for section 6 of X.idmgen     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 179 ]  
+Corr.1 
Proposed text for authentication assurance interoperation in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 178 ]  
 
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 177 ]  
 
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 176 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 175 ]  
 
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 174 ]  
+Corr.1 
Proposed text for trust establishment in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 105 ]  
 
Basic concept for authentication mechanism of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2009-09-03
Resultats:60 documents
Résultats :  1 - 2  - Suivant Next
 
Téléchargement de multiples documents: Cocher les cases correspondant aux documents sélectionnés, puis appuyer sur "Télécharger"
   
 
Préférences utilisateur: 
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):
Pages de navigation HTML  
Formats  + Autres formats
Langues (maximum 2)  + Multilingue 
(E: Anglais - F: Français - S: Espagnol - A: Arabe - C: Chinois - R: Russe)

Testez ITU Translate pour la traduction automatique de documents
Début de page -  Commentaires -  Contactez-nous -  Droits d'auteur © UIT 2008 Tous droits réservés
Contact pour cette page :  TSB EDH
Mis à jour le : 2024-4-28