International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Meeting 2010-04-07 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C (2010-04-07) 

ITU-T SG 17

Security

Study Period 2009

Meeting  from 2010-04-07 to 2010-04-16

held in Switzerland [Geneva]

Other Meetings : 2012-08-29  2012-02-20  2011-08-24  2011-04-11  2010-12-08  2009-09-16  2009-02-11 

Results:20 total items.
Contributions  [ Source: China ]   Documents / Contributions
 
Number 
Title Source AI/Question
Date
[ 277 ]  
 
New Work Item Proposal on security challenge analysis for cloud computing     CATR, MIIT, China   Q8/17   2010-03-29
[ 266 ]  
 
User authentication mechanism of X.p2p-3     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 265 ]  
 
Updated text of X.msec-6: Overview aspects of mobile phones     MIIT, China   Q6/17   2010-03-26
[ 264 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 263 ]  
 
Proposed text in section 7 of X.tcs-1     MIIT, China   Q5/17   2010-03-26
[ 262 ]  
 
A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG     MIIT, China   Q5/17   2010-03-26
[ 261 ]  
 
Proposed draft Recommendation for X.authi: Authentication Integration in IDM     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 260 ]  
 
Proposed draft Rec. X.ismf, Information security management framework     China Mobile   Q3/17   2010-03-26
[ 259 ]  
 
Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"     MIIT, China   Q6/17   2010-03-26
[ 258 ]  
 
Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks     MIIT, China   Q5/17   2010-03-26
[ 257 ]  
 
Organization and Personnel part in X.ismf     China Mobile   Q3/17   2010-03-26
[ 255 ]  
(Rev.1) 
Proposed Application Scenarios to X.giim     MIIT, China   Q10/17   2010-03-26
[ 254 ]  
 
Comparing analysis of abnormal traffic system deployment solutions in X.abnot     China Mobile, Huawei   Q4/17   2010-03-26
[ 253 ]  
 
Clarify Some Issues on IdM in the Cloud Computing     MIIT, China   Q10/17   2010-03-26
[ 252 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2010-03-26
[ 251 ]  
 
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     ZTE, China Mobile   Q4/17   2010-03-26
[ 248 ]  
(Rev.1) 
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network     Huawei Technologies Co.,Ltd. , China Telecom   Q6/17   2010-03-26
[ 243 ]  
 
Assets Management in X.ismf     China Mobile   Q3/17   2010-03-26
[ 242 ]  
 
An analysis of X.authi: Authentication integration between the network and service layers     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 241 ]  
 
A solution to solve the repeated clean problem in the abnormal traffic control system deployment     China Mobile, Huawei   Q4/17   2010-03-26
Results:20 total items.
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2017-4-23