LS | Title | From | To | Approval date |
SG17-LS124 | LS/r on collaboration and liaison representative with ITU-D Question 3/2 | SG17 | ITU-D Q3/2; | 2018-09-07 |
SG17-LS145 | LS on SG17 work item X.iotsec-3: Technical framework of PII (Personally Identifiable Information) handling system in IoT environment | SG17 | ISO/IEC JTC1/SC27/WG5; | 2018-09-07 |
ITU-D SG2-C103 | LS on collaboration from ITU-D Q3/2 | ITU-D SG 2 | SG17; | 2018-05-11 |
ISO/IEC JTC1/SC27/WG1-LS12 | LS/r (reply to SG17-LSs 87, 88, 91 and 93) from ISO/IEC JTC 1/SC 27/WG 4 | ISO/IEC JTC1/SC27/WG1 | SG17; | 2018-05-07 |
SG17-LS87 | LS on SG17 progress on “Security framework for using Identity Based Cryptography for IoT services over telecom networks” | SG17 | IETF SAAG; ISO/IEC JTC1/SC27/WG2; ETSI TC CYBER; | 2018-03-29 |
SG17-LS88 | LS on IoT related activities in ITU-T SG17 | SG17 | ISO/IEC JTC1/SC27/WG4; | 2018-03-29 |
SG17-LS91 | LS on new work item X.framcdc “Framework of the creation and operation for a Cyber Defense Center” | SG17 | ISO/IEC JTC1/SC27/WG4; ITU-D Q3/2; ETSI TC CYBER; | 2018-03-29 |
SG17-LS93 | LS on new work item X.sgBDIP “Security Guidelines for Big Data infrastructure and platform” | SG17 | ISO/IEC JTC1/SC27/WG5; ISO/IEC JTC1/SC27/WG4; ISO/IEC JTC1/WG9; SG13; SG20; | 2018-03-29 |
SG17-LS104 | LS on proposal of workshop on ‘Information Security Management and its implementation in IP environment” | SG17 | ITU-D Q3/2; SG2; SG3; | 2018-03-29 |
SG17-LS115 | LS on best practices in Benin and Senegal | SG17 | ITU-D Q3/2; | 2018-03-29 |
SG17-LS118 | LS on Collaboration and liaison relationship with ITU-D Study Group 2 (Question 3/2) | SG17 | ITU-D Q3/2; | 2018-03-29 |
SG17-LS4 | LS on draft final Report of ITU-D Question 3/2 (Document 2/415) | SG17 | ITU-D Q3/2; | 2017-03-30 |