Contributions  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 232 ]
|
Proposal of a new work item on baseline capabilities and a framework for mobile identity management
|
Korea (Republic of)
|
Q10/17
|
2010-03-26 |
|
[ 231 ]
|
Proposal of 2nd revised text for X.idmsg: Security Guidelines for Identity Management Systems
|
Korea (Republic of)
|
Q10/17
|
2010-03-26 |
|
[ 230 ]
|
Draft Recommendation of x.mcsec-1: Security Requirements and Framework for multicast communication for Consent
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 229 ]
|
Revised draft Recommendation for X.usnsec-2 : USN middleware security guidelines
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 228 ]
|
Revised draft Recommendation on X.gopw: Guideline on preventing malicious code spreading in a data communication network
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 227 ]
|
Proposed Draft of X.isgf (Information Security Governance Framework)
|
Korea (Republic of)
|
Q3/17
|
2010-03-26 |
|
[ 226 ]
|
Proposal for additional text of X.websec-4: Security Framework for Enhanced Web based Telecommunication Service
|
Korea (Republic of)
|
Q8/17, Q7/17
|
2010-03-26 |
|
[ 225 ]
|
The draft text on ITU-T draft Recommendation X.iptvsec-2: Functional requirements and mechanisms for secure transcodable scheme of IPTV
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 224 ]
|
Proposed Recommendation ITU-T X.1086 Amendment 1
|
Korea (Republic of)
|
Q9/17
|
2010-03-26 |
|
[ 223 ]
|
A proposal for the 1st revised text on draft Recommendation ITU-T X.trm: Traceback mechanisms
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 222 ]
|
A proposal for the 1st revised text on ITU-T draft Recommendation X.eipwa: Exchange of Information for preventing web-based attacks
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 221 ]
|
A proposal for revised text on draft Recommendation ITU-T X.tb-ucc: Traceback use cases and capabilities
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 220 ]
|
A proposal for the 3rd draft text of revised Recommendation ITU-T X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network
|
Korea (Republic of)
|
Q2/17
|
2010-03-26 |
|
[ 219 ]
|
Proposal for 5th revised text on ITU-T X.usnsec-1 | I SO/IEC CD 29180: Security framework for ubiquitous sensor network
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 218 ]
|
A proposal for establishing a new work item on guidelines for Cybersecurity Index (CSI)
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 217 ]
|
A proposal for the 6th revised text on draft Recommendation X.iptvsec-3: Key management framework for secure IPTV services
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 216 ]
|
Necessity for studying the Framework for the Downloadable SCP system in the mobile IPTV environment
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 215 ]
|
A proposal for a new work item on cryptographic algorithm suites for the IPTV SCP
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 214 ]
|
Support for establishing JCA on Security in SG 17
|
Korea (Republic of)
|
QALL/17
|
2010-03-26 |
|
[ 213 ]
|
A Proposal of draft text for draft Recommendation X.sips: A framework for countering cyber attacks in SIP-based services
|
Korea (Republic of)
|
Q4/17
|
2010-03-26 |
|
[ 212 ]
|
Proposal of the 2nd draft text for X.amg : Asset Management Guidelines in Telecommunication Organizations
|
Korea (Republic of)
|
Q3/17
|
2010-03-26 |
|
[ 211 ]
|
Proposal of the 3rd draft text for X.sap-3: The management framework of one time password-based authentication service
|
Korea (Republic of)
|
Q7/17
|
2010-03-26 |
|
[ 210 ]
|
A Proposal of 2nd Draft text of Information Security Management Guidelines for Small and Medium Telecommunication Organizations (X.sgsm)
|
Korea (Republic of)
|
Q3/17
|
2010-03-26 |
|
[ 209 ]
|
Proposal for the 3rd revised text on the draft Recommendation X.usnsec-3: Secure routing mechanisms for Wireless Sensor Network
|
Korea (Republic of)
|
Q6/17
|
2010-03-26 |
|
[ 208 ]
|
A Proposal for the 3rd revised text on ITU-T draft Recommendation X.tcs-2: Technical means for countering VoIP spam
|
Korea (Republic of)
|
Q5/17
|
2010-03-26 |
|
[ 207 ]
|
Addition of Appendix II to ITU-T draft Recommendation X.fcsip: Framework for countering spam in IP-based multimedia applications
|
Korea (Republic of)
|
Q5/17
|
2010-03-26 |
|
[ 206 ]
|
IdM Roadmap - Updated description for STORK
|
UK (Department for Business, Innovations
,
and Skills)
|
Q10/17
|
2010-03-26 |
|
[ 205 ]
|
Proposal for Secure Interface between UAC and VSPS
|
Huawei Technologies Co.,Ltd
|
Q5/17
|
2010-03-26 |
|
[ 204 ]
|
X.1252-X.idmdef: Remarks and Comments on the Draft Recommendation X.1252
|
Federal Republic of Germany
|
Q10/17
|
2010-03-25 |
|
[ 203 ]
|
Comments on X.msec-6: Security aspects of smart phones
|
KDDI Corporation
|
Q6/17
|
2010-03-25 |
|
[ 202 ]
|
Propose to consider ICGS deployment in wireless network
|
Huawei Technologies Co., Ltd.
|
Q5/17
|
2010-03-25 |
|
[ 201 ]
|
X.interfaces; Comments to draft X.interfaces
|
Federal Republic of Germany
|
QALL/17
|
2010-03-25 |
|
[ 200 ]
|
X.oid-res, Amendments to current draft
|
Federal Republic of Germany
|
Q12/17
|
2010-03-25 |
|
[ 199 ]
|
X.cybex-series & X.sisfreq: Comments
|
Federal Republic of Germany
|
Q4/17
|
2010-03-25 |
|
[ 198 ]
|
X.1275 (X.rfpg): TAP comments on draft new Recommendation
|
Federal Republic of Germany
|
Q10/17
|
2010-03-25 |
|
[ 197 ]
|
Proposal for a procedure to start new study activities
|
Federal Republic of Germany
|
QALL/17
|
2010-03-25 |
|
[ 196 ]
|
X.tb-ucc & X.trm: Comments
|
Federal Republic of Germany
|
Q4/17
|
2010-03-25 |
|
[ 195 ]
|
Comments on Identity Management Roadmap
|
Canada
|
Q10/17
|
2010-03-23 |
|
[ 194 ]
(Rev.1) |
Comments on Recommendation ITU-T X.1252, Baseline identity management terms and definitions
|
Canada
|
Q10/17
|
2010-03-23 |
|
[ 193 ]
|
The future of the Identity Management Roadmap
|
Canada
|
Q10/17
|
2010-03-23 |
|
[ 192 ]
(Rev.1) |
Revised text for draft Rec. X.trm: Traceback mechanisms
|
NICT, Japan
|
Q4/17
|
2010-03-23 |
|
[ 191 ]
(Rev.1) |
Revised text for draft Rec. X.gopw: Guideline on preventing malicious code spreading in a data communication network
|
NICT, Japan
|
Q4/17
|
2010-03-23 |
|
[ 190 ]
|
X.cybex.2: Use of XML Namespace in the Cybersecurity Information Exchange Framework
|
NICT, Japan
,
LAC, Japan
|
Q4/17, Q12/17
|
2010-03-25 |
|
[ 189 ]
(Rev.1) |
Consideration of Cybersecurity Entities for OID-based cybersecurity information discovery mechanisms
|
NICT, Japan
|
Q4/17, Q12/17
|
2010-03-23 |
|
[ 188 ]
|
Foundations of IdM
|
Telenor ASA
|
Q12/17, Q10/17
|
2010-03-12 |
|
[ 187 ]
|
Adoption of a timetable for WP meetings for the rest of the study period
|
France
|
QALL/17
|
2010-03-01 |
|
[ 186 ]
|
TAP comments on draft new Recommendation X.1275 (X.rfpg)
|
France
|
Q10/17
|
2010-03-01 |
|
[ 185 ]
|
Proposed new draft of ITU-T X.alerting
|
France Telecom Orange
|
Q4/17, Q12/17
|
2010-01-08 |
Results:98 total items. Result page:
Previous -
1 -
2
|
Multiple Document Download: Formats and Languages to be included (when available):