Mar20-summary
|
Page Content Executive Summary Meeting of ITU-T SG17 'Security' (virtual, 17-26 March 2020) Hot topics: - First fully virtual decision making ITU-T SG meeting
- IoT Security
- ITS Security
- Cloud Security
- DLT security
- Authentication
- Fintech
- Quantum based security
- Preparation for WTSA-2020
Meeting Output:- TAP approval: 6 new Recommendations, Details are in Annex A a).
- TAP determined : 9 new and 2 revised Recommendations, Details are in Annex A d).
- AAP Consented: 3 new Recommendations for Last Call. Details are in Annex A e).
- Agreed: 2 Technical Reports. Details are in Annex A c).
- New work items: 7 NWIs were agreed to be added to the SG17 Work Programme. Details are in Annex B.
Next SG17 meeting:- Friday 29 May 2020, 12:30-15:00 CET, SG17 e-plenary
- 6 texts are candidate for action in next SG17 May e-plenary, see in Annex A f).
- Open and extended management team meeting on Thursday 28 May 2020, 13:30-14:30
- Tuesday 25 August – Thursday 3 September 2020 (fully virtual meeting, pending SG17 e-plenary on 29 May 2020)
- 47 texts are candidate for action in next SG17 Aug/Sept meeting, see in Annex A g).
- Interim RGMs: 9 Questions plan to hold 12 RGMs.
-
| Q | Date | Place/Host | Subject/objective | 1. | 3/17 | 2-3 June 2020
| e-meeting | - To address all work items of Q3/17
| 2. | 4/17 | April 2020 | e-meeting | - To address and discuss Quantum issues
| 3. | 5/17 | July 2020 | e-meeting | - discuss X.1246,X1247 and other issues about AI and anti-fraud on the basis of received contributions
| 4. | 6/17 | May 2020 | e-meeting | - To address all work items and identify future topics for Q6/17.
| 5. | 8/17 | 7-8 May 2020 | e-meeting | - To address all items of Q8/17
| 6. | 8/17 | 7-8 July 2020 | e-meeting | - To address all items of Q8/17
| 7. | 10/17 | 2nd week May 2020 | e-meeting | - To progress all the work of Q10/17
| 8. | 10/17 | 2nd week July 2020 | e-meeting | - To progress all the work of Q10/17
| 9. | 11/17
| 22 April 2020 | e-meeting | - Collaborative meeting ITU-T Q11/17 and ISO/IEC/JTC 1/SC 6/WG 10
- To prepare X.509prot for SG17 29 May e-plenary
| 10. | 13/17 | 13 May 2020 (3hours) | e-meeting | Q13/17 interim Rapporteur group meeting | 11. | 13/17 | 10-11 June 2020 | e-meeting | Q13/17 interim Rapporteur group meeting - To address all work items
| 12. | 14/17
| 22-23 June 2020 | Beijing, China/e-meeting | - Focus on work items toward consent at the next meeting
|
Tutorial: Security aspects of New IP based Networking, TD2541Participation:
- 225 participants - record high (past meetings: 206, 178, 168, 130, 134, 146): 32 countries, 28 Sector Members, 4 Associates, and 4 Academia. 5 invited experts.
Correspondence Groups (2 continued, 1 new):- CG-xss (correspondence group on transformation of security study): continued
- CG-wtsa20-prep (Correspondence Group on SG17 preparation for WTSA-20): continued
- CG-SECAD (Correspondence Group on security architecture development): new
Meeting input and organization:- Contributions: 121 – stable (past meetings: 151, 118, 144, 113, 106, 78, 81, 66, 74, 80)Contribution# from: APT (91 (75%) (= China 40 (33%), Korea 39(32%), Japan 12), Americas (15 (US 14+CA 1)), EUR (11 (Swiss 5+Den 4+F 1+UK 1)), AFR (4), ARAB (1), LAM (2), Russia (1).
- TDs: 439 (previous meeting: 508, 380, 420, 395, 426, 368, 391, 418, 371, 386), including 77 incoming liaison statements and 24 outgoing liaison statements.
Annex A Actions taken on Recommendations and other texts at the 26 March 2020 e-plenarya) TAP Recommendations approved (WTSA-16 Resolution 1):# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1.
| 6/17 | X.1332 (X.sgsec-3) | Security guidelines for smart metering services in smart grids | New | Gunhee Lee | R46 | | 2016-09 | 2019-09 | 2. | 6/17 | X.1364 (X.nb-iot) | Security requirements and framework for narrow band Internet of Things | New | Feng Gao, Junjie Xia, Heung Youl Youm, Bo Yu | R45 | | 2017-09 | 2019-09 | 3. | 6/17 | X.1365 (X.ibc-iot) | Security methodology for the use of identity-based cryptography in support of Internet of things services over telecommunication networks | New | Zhaohui Cheng, Haiguang Wang, Jiang Yu | R43 | | 2017-09 | 2019-09 | 4. | 8/17 | X.1604 (X.SRNaaS) | Security requirements of network as a service (NaaS) in cloud computing | New | Zhiyuan Hu, Ye Tao, Chen Zhang, Ni Zhang | TD2844 | | 2016-08 | 2019-09 | 5. | 8/17 | X.1605 (X.SRIaaS) | Security requirements of public infrastructure as a service (IaaS) in cloud computing | New | Huamin Jin, Laifu Wang, Mengxi Wang, Shuai Wang | R47 | | 2016-03 | 2019-09 | 6. | 13/17 | X.1372 (X.itssec-2) | Security guidelines for Vehicle-to-Everything (V2X) communication | New | ChangOh Kim, Sang-Woo Lee, Jae-Hoon Nah, Seungwook Park | R49 | | 2014-09 | 2019-09 |
b) TAP Recommendations not approved (WTSA-16 Resolution 1):None. c) Technical Reports agreed:Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 4/17 | TR.sec-qkd | Technical report: Security framework for quantum key distribution in telecom network | New | Matthieu Legré, Dong-Hi Sim | TD2832 | | 2018-09 | 2020-03 | 11/17 | TR.ors | Technical report: Problems, requirements and potential solutions for OID resolution | New | Mark McFadden, Ruifen Mu, Linjian Song | TD2920R1 | | 2019-09 | 2020-03 |
d) Recommendations determined (TAP – WTSA-16 Resolution 1):# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 3/17 | X.1054rev | Information technology - Security techniques - Governance of information security | Rev | Thaib MUSTAFA Anfona TRAORE Jinghua MIN | TD2924R1 | ISO/IEC 27014 | 2020-03 | 2020-03 | 2. | 4/17 | X.1216 (X.gcpie) | Guidelines for Collection and Preservation of Cyber Security Incident Evidence | New | Ikkyun Kim, Jonghyun Kim Jooyoung Lee, Daesung Moon,
| TD2855R2 | | 2018-03 | 2020-03 | 3. | 6/17 | X.1366 (X.amas-iot) | Aggregate message authentication scheme for IoT environment | New | Koji Nakao, Junji Shikata | TD2886R2 | | 2018-09 | 2020-03 | 4. | 6/17 | X.1367 (X.elf-iot) | Standard format of IoT error logs for security incident operations | New | Kiyotaka Atsumi , Koji Nakao | TD2887R2 | | 2018-09 | 2020-03 | 5. | 7/17 | X.1148 (X.fdip)
| Framework of de-identification processing service for telecommunication service providers | New | Ye Won Lee, Hyungjin, Lim, Lijun Liu, Jongyoul Park, Heung Youl Youm | TD2850R3 | | 2016-08 | 2020-03 | 6. | 8/17 | X.1750 (X.GSBDaaS)
| Guidelines on security of big data as a Service for big data service provider | New | Mark McFadden, Nan Meng, Chen Zhang | TD2913R3 | | 2016-09 | 2020-03 | 7. | 8/17 | X.1606 (X.SRCaaS)
| Security requirements for communication as a service application environments | New | Xuetao Du, Nan Meng, Ye Tao. Chen Zhang | TD2857R1 | | 2016-09 | 2020-03 | 8. | 8/17 | X.1751 (X.sgtBD)
| Security guidelines of lifecycle management for telecom Big Data | New | Feng Gao, Jin Peng, Lanfang Ren | TD2824R2 | | 2017-09 | 2020-03 | 9. | 10/17 | X.1254rev | Entity authentication assurance framework | Rev | Abbie Barbir, David Turner | TD2828R1 | | 2016-03 | 2020-03 | 10. | 10/17 | X.1279 (X.eaasd)
| Framework of enhanced authentication in telebiometric environments using anti-spoofing detection mechanisms | New | Kepeng Li Hongwei Luo | TD2869 | | 2016-08 | 2020-03 | 11. | 14/17 | X.1403 (X.dlt-sec)
| Security considerations for using DLT data in Identity Management | New | Abbie Barbir | TD2909 | | 2017-09 | 2020-03 |
e) AAP Recommendations consented for Last Call (Recommendation ITU-T A.8):# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 7/17 | X.1149 (X.sfop)
| Security framework of open platform for FinTech services | New | Feng Gao, HyungJin Lim, Jae Hoon Nah, Xin Wang | TD2808 | | 2017-09 | 2020-03 | 2. | 7/17 | X.1451 (X.tfrca)
| Technical framework of risk control to support authentication | New | Xin Wang, Min Zuo | TD2823 | | 2018-09 | 2020-03 | 3. | 14/17 | X.1403 (X.sra-dlt)
| Security framework for Distributed Ledger Technology | New | Xiaoyuan Bai, Qiwi Kirill Ivkushkin, Petr Kalambet, Min Shu, Bilyk Tatiana, Hongru Zhu | TD2831R2 | | 2017-09 | 2020-03 |
f) Work items planned for action in next SG17 special e-plenary meeting on 29 May 2020:# | Q(1) | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 4/17 | TR.usm** | Technical Report: Unified Security Model (USM) - a neutral integrated system approach to Cybersecurity | New | Jacques Francoeur, Paul B. Najarian | TD2878 | | | | 2. | 4/17 | X.cf-QKDN | Use of cryptographic functions on a key generated by a Quantum Key Distribution networks | New | Matthieu Legré, Dong-Hi Sim | TD2870 [Note 1] | | 2019-01 | 2020-03 | 3. | 4/17 | X.sec-QKDN_ov | Security requirements for QKD networks - Overview | New | Matthieu Legré Zhangchao Ma, Hao Qin, Dong-Hi Sim | TD2872R1 [Note 2] | | 2019-01 | 2020-03 | 4. | 6/17 | X.1363*** (X.iotsec-3) | Technical framework of personally identifiable information (PII) handling system in Internet of things (IoT) environment | New | Yutaka Miyake, Bo Yu | TD2862R1 | | 2017-03 | 2019-09 | 5. | 11/17 | X.509prot | Protocol specifications for public-key infrastructure and privilege management infrastructure | New | Erik Andersen | TD2943 [Note 3] | ISO/IEC 9594-11 | 2018-09 | 2020-05 | 6. | 13/17 | X.1371*** (X.stcv) | Security threats to connected vehicles | New | ChangOh Kim, Sang-Woo Lee, Koji Nakao, Seungwook Park | TD2885R2 | | 2018-03 | 2019-09 |
Note: ** For approval by agreement of SG17 *** For TAP approval [Note 1]To be finalized by Q4/17 RGM in April 2020
[Note 2]To be finalized by Q4/17 RGM in April 2020
[Note 3]To be finalized by Q11/17 RGM on 22 April 2020
g) Work items planned for action in next SG17 Aug/Sept 2020 meeting:# | Q(1) | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1.
| 1/17
| Security**
| Manual Security in telecommunications and information technology (7th edition) | Rev | Kyeong Hee Oh | TD2657
| | 2018-09
| 2020-09
| 2.
| 1/17
| TR.suss-rev**
| Technical Report: Successful use of security standards
| Rev
| Abbie Barbir
| TD2904
| | 2019-01
| 2020-09
| 3. | 2/17 | X.SDSec | Guideline on software-defined security in SDN (Software-defined Networking)/NFV (Network Function Virtualization) network
| New | Zhiyuan Hu, Ye Tao, Junzhi Yan, Bo Yang, Xiaojun Zhuang | TD2889 | | 2018-03 | 2020-09 | 4. | 3/17 | X.1052rev | Organization information security management guideline | Rev | Lijun Liu, Ming Lyu, Jinghua Min | TD2881 | | 2019-09 | 2020-09 | 5. | 4/17 | TP.inno** | Description of the incubation mechanism and ways to improve it | New | Arnaud Taddei | TD2874R1 | | | 2020-09 | 6. | 4/17 | TP.sgstruct** | Strategic approaches to the transformation of security studies | New | Arnaud Taddei | TD2873R1 | | | 2020-09 | 7. | 4/17 | X.fgati* | Framework and guidelines for applying threat intelligence in telecom network operation | New | Yexia Chang, Lanfang Ren, Min Zuo | TD2847R1 | | 2018-03 | 2020-09 | 8. | 4/17 | X.rdmase | Requirements and guidelines for dynamic malware analysis in a sandbox environment | New | Sheng Gao, Zhaoji Lin, Tian Tian, Jigang Wang, Hanbing Yan | TD2858 | | 2019-01 | 2020-09 | 9. | 4/17 | X.sec-QKDN-km | Security requirements for quantum key distribution networks - Key management | New | Kaoru Kenyoshi, Jiajun Ma, Zhangchao Ma, Donghi Sim | TD2871 | | 2019-01 | 2020-09 | 10. | 5/17 | TR.cs-ml** | Technical Report: Countering spam based on machine learning | New | Wei LIU Ye TAO | TD2829R3 | | 2019-09 | 2020-09 | 11. | 5/17 | X.1246rev | Technologies involved in countering voice spam in telecommunication organizations | Rev | Dmitry Cherkesov, Yanbin Zhang | TD2838 | | 2019-09
| 2020-09 | 12. | 5/17 | X.1247rev | Technical framework for countering mobile messaging spam | Rev
| Dmitry Cherkesov, Yanbin Zhang
| TD2838
| | 2019-09
| 2020-09
| 13. | 5/17 | X.gcims* | Guidelines for countering instant messaging spam | New | Huamin Jin, ChangOh Kim, Laifu Wang, Shuai Wang, Yanbin Zhang | TD2825R3 | | 2017-09 | 2020-09 | 14. | 5/17 | X.tecwes | Technologies in countering website spoofing for telecommunication organizations | New | Ruzhen Hu, Meng Nan, Chen Zhang
| TD2394 | | 2018-03 | 2020-03 | 15. | 5/17 | X.tsfpp* | Technical security framework for the protection of users' personal information while countering mobile messaging spam
| New | Feng Gao, Junjie Xia, Bo Yu, Chen Zhang, Yanbin Zhang
| TD2456 | | 2018-03 | 2020-09 | 16. | 6/17 | X.5Gsec-q | Security guidelines for applying quantum-safe algorithms in 5G systems | New | Yanfei Guo, Zhiyuan Hu, Zhaoji Lin, Fuwen Liu, Min Zuo | TD2893R3 | | 2018-03 | 2020-03 | 17. | 6/17 | X.secup-iot* | Secure software update procedure for IoT devices | New | Yunchul Choi, Koji Nakao, Takeshi Takahashi | TD1959R1 | | 2017-09 | 2020-03 | 18. | 6/17 | X.ssp-iot* | Security requirements and framework for IoT service platform | New | Hao Dong, Yanfei Guo, Lijun Liu, Jae Hoon Nah, Wenxin Wang, Junjie Xia | TD2472 | | 2018-03 | 2020-09 | 19. | 7/17 | X.sgos | Security guidelines of web-based online customer service | New | Hao Dong, Lijun Liu, Jae Hoon Nah, Wenxin Wang | TD2922 | | 2018-03 | 2020-09 | 20. | 7/17 | X.tfss | Technical framework for security services provided by operators | New | Yexia Cheng, Feng Gao, Yu Jiang, Jae Hoon Nah, Arnaud Taddei, Junjie Xia | TD2896 | | 2018-03 | 2020-09 | 21. | 8/17 | X.nssa-cc* | Requirements of network security situational awareness platform for cloud computing | New | Huamin Jin, Laifu Wang, Yi Zhang, Zhaoji Lin | TD2429 | | 2019-09 | 2020-09 | 22. | 8/17 | X.sgBDIP* | Security guidelines for big data infrastructure and platform | New | Arnaud Taddei, Ye Tao, Laifu Wang | TD2449 | | 2018-03 | 2020-09 | 23. | 8/17 | X.sgcc* | Security guidelines for container in cloud computing environment | New | Lanfang Ren, Ye Tao, Laifu Wang, Lei Xu | TD2446 | | 2018-09 | 2020-09 | 24. | 10/17 | X.1252rev* | Baseline identity management terms and definitions | Rev | Abbie Barbir | TD2809 | | 2018-03 | 2020-09 | 25. | 10/17 | X.upu* | UPU S68 Postal identity management framework | New | Abbie Barbir, Gustavo Damy | TD2507R1 | UPU S68 | 2019-09 | 2020-09 | 26. | 11/17 (, 10/17) | X.pki-em | Information Technology – Public Key Infrastructure: Establishment and maintenance | New | Erik Andersen | TD2493 | | 2014-01 | 2020-09 | 27. | 11/17 | X.680rev | Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation | Rev | Paul Thorpe | TD2807 | ISO/IEC 8824-1 | 2019-09 | 2020-09 | 28. | 11/17 | X.681rev | Information technology - Abstract Syntax Notation One (ASN.1): Information object specification | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8824-2 | 2019-09
| 2020-09
| 29. | 11/17 | X.682rev | Information technology - Abstract Syntax Notation One (ASN.1): Constraint specification | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8824-3 | 2019-09
| | 30. | 11/17 | X.683rev | Information technology - Abstract Syntax Notation One (ASN.1): Parameterization of ASN.1 specifications | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8824-4 | 2019-09
| 2020-09
| 31. | 11/17 | X.690rev | Information technology - ASN.1 encoding rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER) | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-1 | 2019-09
| 2020-09
| 32. | 11/17 | X.691rev | Information technology - ASN.1 encoding rules: Specification of Packed Encoding Rules (PER) | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-2 | 2019-09
| 2020-09
| 33. | 11/17 | X.692rev | Information technology - ASN.1 encoding rules: Specification of Encoding Control Notation (ECN) | Rev | Paul Thorpe
| TD2807
| ISO/IEC 8825-3 | 2019-09
| 2020-09
| 34. | 11/17 | X.693rev | Information technology - ASN.1 encoding rules: XML Encoding Rules (XER) | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-4 | 2019-09
| 2020-09
| 35. | 11/17 | X.694rev | Information technology - ASN.1 encoding rules: Mapping W3C XML schema definitions into ASN.1 | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-5 | 2019-09
| 2020-09
| 36. | 11/17 | X.695rev | Information technology - ASN.1 encoding rules: Registration and application of PER encoding instructions | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-6 | 2019-09
| 2020-09
| 37. | 11/17 | X.696rev | Information technology - ASN.1 encoding rules: Specification of Octet Encoding Rules (OER) | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-7 | 2019-09
| 2020-09
| 38. | 11/17 | X.697rev
| Information technology - ASN.1 encoding rules: Specification of JavaScript Object Notation Encoding Rules (JER) | Rev
| Paul Thorpe
| TD2807
| ISO/IEC 8825-8 | 2019-09
| 2020-09
| 39.
| 12/17
| Z.160-170-series
| TTCN-3 series
| Rev
| Dieter Hogrefe
| | ETSI
| | 2020-09
| 40. | 13/17 | X.itssec-3 | Security requirements for external device with vehicle access capability | New | Aram Cho, Sang-Woo Lee, Whapyeong Lim, Seungwook Park | TD2845R1 | | 2017-09 | 2020-03 | 41. | 13/17 | X.itssec-4 | Methodologies for intrusion detection system on in-vehicle system | New | ChangOh Kim, HuyKang Kim, Sang-Woo Lee, Seungwook Park | TD2883R2 | | 2017-09 | 2020-09 | 42. | 13/17 | X.mdcv* | Security-related misbehaviour detection mechanism based on big data analysis for connected vehicles | New | Jianhao Liu, Minruni Yan, Yi Zhang | TD2725 | | 2018-03 | 2020-09 | 43. | 14/17 | X.dlt-td | Terms and definitions for distributed ledger technology | New | Heung Youl Youm, Ji Hye Kim | TD2821R1 | | 2019-09 | 2020-09 | 44. | 14/17 | X.sa-dlt | Security assurance for distributed ledger technology | New | Mee Yeon Kim, Ke Wang, Heung Youl Youm | TD2819R1 | | 2017-09 | 2020-09 | 45. | 14/17 | X.srip-dlt* | Security requirements for intellectual property management based on distributed ledger technology | New | Jung Yeon Hwang, Juhee Ki, Min Shu, Wenlei Wang, Yang Wu, Yunwei Zhao | TD2816R1 | | 2018-09 | 2020-09 | 46. | 14/17 | X.str-dlt | The security threats and requirements for digital payment services based on distributed ledger technology | New | ChangOh Kim, Kyeong Hee Oh, Preetika Singh | TD2826R1 | | 2017-09 | 2020-03 | 47. | 14/17 | X.tf-spd-dlt | Technical framework for secure software programme distribution mechanism based on distributed ledger technology | New | Feng Gao, Nan Jiang, Ke Wang, Junjie Xia, Bo Yu | TD1926 | | 2018-03 | 2020-09 |
Note: * for TAP determination ** for approval by SG17 agreement Annex B New work itemsThe following new work items were agreed to be added to the SG17 Work Programme: # | Question | NWI | Title | C | TD | Editors | Timing | 1. | 3/17 | X.1051rev2 | Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations | C770 | TD2945R1 | Thaib MUSTAFA Jinghua MIN Hang DONG | 2024 | 2. | 9/17 | X.pet_auth | Proposal for new work item X.pet_auth: Entity authentication service for pet animals using telebiometrics | C804 | TD2900 | Jason Kim, Taeheon Kim | 2023 | 3. | 7/17 | X.sggmsp* | Proposal for new work item: Security guideline for group movement service platform | C809 | TD2891R1 | ChangOh Kim, SangHoon Jeon, JooSun Yoon, Heung Youl Youm | 2022-03 | 4. | 7/17 | X. smdtsc | Proposal for new work item: Security Measures for Digital Twin System of Smart Cities | C831 | TD2927 | Junjie Xia, Feng Gao, Jae Hoon Nah, Longjun Zhao, Feng Zhang | 2022-03 | 5. | 7/17 | X.smsrc | Proposal for new work item: Security Measures for Smart Residential Community Services | C832 | TD2928 | Junjie Xia, Feng Gao, Jae Hoon Nah, Longjun Zhao, Feng Zhang | 2022-03 | 6. | 4/17 | X.sgfdcml | Proposal for new work item: Security guidelines for FHE-based machine learning | C845 | TD2897 | Jihoon Cho, Donggeon Yhee, Jae Hoon Nah | 2021-09 | 7. | 11/17 | X.672rev | Information technology – Open systems interconnection – Object identifier resolution system | | TD2919 | Linjian Song RuiFen Mu | 2021-03 |
Notes: (1) Target date for AAP consent or TAP determination of Recommendations, or for approval by agreement of Supplements or non-normative text. *: for TAP determination, **: for approval by SG17 agreement ***: for TAP approval Annex C Work items Removednone
|
|
|
|
|