Committed to connecting the world
Search for:
ITU
General Secretariat
Radiocommunication
Standardization
About ITU-T
Events
All Groups
Standards
Resources
BSG
Study Groups
Regional Presence
Join ITU-T
Development
News
Members' Zone
Join ITU
Tutorials
Rollup Image
You are here
ITU
>
Home
>
ITU-T
>
Study Groups
>
2009-2012
>
Tutorials
Share
Page Content 20
2012
SG 17 Orientation session for newcomers, Arkadiy Kremer, SG 17 Chairman
Information session on Direct Document Posting, Maite Comas Barnés, TSB
Cyber Security Research at the American University of Beirut”, Imad H. Elhajj, American University of Beirut, Lebanon
Cloud Computing Security”, Frédéric Gittler, HP Laboratories/France
Describing and serializing structured data - A history and comparison of approaches”, John Larmouth, Q12/17 Rapporteur
Introduction and Discussion to OGC Open GeoSMS Standard”, Kuo-Yu "Slayer" Chuang/editor of the OGC Open GeoSMS specification
Global Collaboration on Automotive, ITS and Standards - ITS security – a topic for Study Group 17?”; Reinhard Scholl, Deputy to the Director, TSB
ITS – a security, safety and privacy challenge for society and technology”, Scott Cadzow, ETSI ITS WG 5 chair
Operationalize Policy with Marketing - Reach, Transparency and Trust; Marc Kaplan, Soli United
2011
3rd Generation eID - Agile eIDs for Widespread National Use
, Jon Shamah, Head, EMEA Sales, eSecurity, NETS
Securing the Cyber Ecosystem - Automation and Standards to Build Security In
, Robert Martin, MITRE/USA
RFID Security & Privacy at both Physical and System Levels
, Professor Robert Deng and Professor Yingjiu Li, Singapore Management University, Singapore
DEMONS - Decentralized, cooperative and privacy preserving Monitoring for trustworthiness
, Dr. Sathya Rao, KYOS, Geneva, Switzerland
IF-MAP Overview
, Jan Ursi, Infoblox
ITU-T Study Group 17, Security, A brief overview for newcomers
Korea’s experience of massive DDoS attacks from Botnet
, Heung Youl YOUM, SG 17 Vice chairman
ITU Smart Exchange Addresses (SEA) - An exclusive ITU BCG 2 BCG Services
, Thierry Zaradey, ITU SecGen/IS
2010
Application of CYBEX (Cybersecurity Information Exchange) techniques to future networks
, Tony Rutkowski
X.500/LDAP
as OID and URN resolver
, Erik Andersen
Reference Model of Cloud Computing, Public Carrier’s View
, Vladimir Belenkovich
DRM Interoperability using as examples Marlin, Coral and DECE
, Albhy Galuten
Harmonizing identity management, privacy and security in the cloud and in the grid: Dynamic distributed key infrastructures and dynamic identity verification and authentication
, Andre Brisson
UNCITRAL legislative standards on electronic communications and electronic signatures: an introduction
, Luca G. Castellani
IMPACT - Bridging Governments, Academia & Industry
, Sivanathan Subramaniam
2009
Organization for the Advancement of Structured Information Standards (OASIS )
, Abbie Barbir
De-Mail: A reliable and secure online communication platform
, Armin Wappenschmidt
Significant Cybersecurity Developments: A global cybersecurity information exchange framework, plus Clouds, SmartGrid, and eHealth
, Tony Rutkowski, Rapporteur Q.4/17
Positioning of .oid in the DNS
, John Larmouth, Rapporteur Q.12/17
ETSI Security Standardisation
, Dr. Carmine Rizzo, ETSI
Standards in biometrics, Short insight in thesis results
, Martin Adolph, ITU/TSB
Past tutorials
Page Content 9
Page Content 10
Page Content 18
Page Content 19
Page Content 6
Page Content 7
Page Content 11
Page Content 12
Page Content 2
Page Content 3
Page Content 4
Page Content 5
Page Content 13
Page Content 14
Page Content 15
Page Content 16
Follow us
Twitter
Facebook
YouTube
Flickr
Linkedin
Instagram
Soundcloud
Podcasts
Spotify
Spreaker
TikTok