Contributions |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 731 ]
|
A proposal for the 5th revised text for Recommendation ITU-T X.iptvsec-6, Framework for the downloadable service and content protection system in the mobile IPTV environment, for consent
|
Korea (Rep. of)
|
Q6/17
|
2012-08-16 |
|
[ 730 ]
|
Proposed draft text of X.sgsec-1 - Security functional architecture for smart grid services using telecommunication network
|
Korea (Rep. of)
|
Q6/17
|
2012-08-16 |
|
[ 729 ]
|
X.iptvsec-8: Proposed text of clause 8 Virtual machine based security platform
|
Korea (Rep. of)
|
Q6/17
|
2012-08-16 |
|
[ 728 ]
|
The 5th revised text of Recommendation ITU-T X.iptvsec-8: Virtual machine based security platform for renewable IPTV SCP
|
Korea (Rep. of)
|
Q6/17
|
2012-08-16 |
|
[ 727 ]
|
Withdrawn
|
N/A
|
|
2012-08-16 |
|
[ 726 ]
|
A proposal for the 6th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2012-08-16 |
|
[ 725 ]
|
A proposal for the 6th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2012-08-16 |
|
[ 724 ]
|
A proposal for the 6th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Rep. of)
|
Q4/17
|
2012-08-16 |
|
[ 723 ]
|
Proposal for the 1st revised text on draft Recommendation ITU-T X.sisnego, framework of security information sharing negotiation
|
Korea (Rep. of)
|
Q4/17
|
2012-08-16 |
|
[ 722 ]
|
Clarification of comments on Recommendation ITU-T X.gpim in C 662
|
Korea (Rep. of)
|
Q3/17
|
2012-08-16 |
|
[ 721 ]
|
A proposal for the revised baseline document for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
|
Korea (Rep. of)
|
Q3/17
|
2012-08-16 |
|
[ 720 ]
|
A proposal for the revised draft of Recommendation ITU-T X.sgsm, Information security management guidelines for small and medium-sized telecommunication organizations
|
Korea (Rep. of)
|
Q3/17
|
2012-08-16 |
|
[ 719 ]
|
Request for clarification of the intent of the documentation template on new study activities and procedures/condition to establish a new work item by the Members
|
Korea (Rep. of)
|
Q1/17
|
2012-08-16 |
|
[ 718 ]
|
A proposal for the third draft Recommendation of ITU-T X.sap-5
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2012-08-16 |
|
[ 717 ]
|
Contribution for X.abnot(Inline Control Latency Problem)
|
China Unicom
|
Q4/17
|
2012-08-16 |
|
[ 716 ]
|
Contribution for X.gsiiso (Security Objectives)
|
China Unicom
|
Q2/17
|
2012-08-16 |
|
[ 715 ]
|
Contribution for X.gsiiso(Security Requirements)
|
China Unicom
|
Q2/17
|
2012-08-16 |
|
[ 714 ]
(Rev.1) |
Opposition to establishment of a new work item on social networking
|
United States
|
Q7/17
|
2012-08-16 |
|
[ 713 ]
|
Draft text of Recommendation ITU-T X.ccsec: High-level Security Framework for Cloud Computing
|
China
,
China Telecommunications Corporation
,
Microsoft Corporation
,
ZTE Corporation
|
Q8/17
|
2012-08-16 |
|
[ 712 ]
|
Contribution for X.gsiiso (Functional Parts and Service Procedures)
|
China Unicom
|
Q2/17
|
2012-08-16 |
|
[ 711 ]
|
Contribution for X.gsiiso(Relationship between User, Pipe and Content)
|
China Unicom
|
Q2/17
|
2012-08-16 |
|
[ 710 ]
|
Updated text of X.msec-6: Security aspects of smartphones
|
Ministry of Industry and Information Technology (MIIT)
|
Q6/17
|
2012-08-16 |
|
[ 709 ]
|
Proposal for a new work item: Technical framework for countering web spam
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2012-08-16 |
|
[ 708 ]
|
Comments on X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2012-08-16 |
|
[ 707 ]
(Rev.1) |
Proposal for new work item about definition and naming specifications of malicious programs of mobile internet
|
Ministry of Industry and Information Technology (MIIT)
|
Q6/17, Q4/17
|
2012-08-16 |
|
[ 706 ]
|
Introduction of Test Access Point and Optical Splitter
|
ZTE Corporation
|
Q2/17
|
2012-08-16 |
|
[ 705 ]
|
Withdrawn
|
N/A
|
|
2012-08-16 |
|
[ 704 ]
|
Proposed text for x.ccsec clause 10
|
ZTE Corporation
|
Q8/17
|
2012-08-16 |
|
[ 703 ]
(Rev.1) |
Proposed text for chapter 8 of X.goscc
|
China Telecommunications Corporation
|
Q8/17
|
2012-08-16 |
|
[ 702 ]
(Rev.1) |
Revised Z.151 (11/08) User requirements notation (URN) - Language Definition
|
Canada
|
Q13/17
|
2012-08-15 |
|
[ 701 ]
(Rev.1) |
Proposal for New Work Item - Identity and Access Management Ontology
|
MBNA Canada
|
Q10/17
|
2012-08-15 |
|
[ 700 ]
(Rev.1) |
Comments on Draft Recommendations: X.capec; X.cce; X.cee; X.cwss; X.maec; and X.0val
|
Canada
|
Q4/17
|
2012-08-15 |
|
[ 699 ]
(Rev.1) |
Comments on Draft Recommendation X.abnot
|
Canada
|
Q4/17
|
2012-08-15 |
|
[ 698 ]
(Rev.1) |
Proposal to Update Appendix I and Bibliography of X.1500
|
Canada
|
Q4/17
|
2012-08-15 |
|
[ 697 ]
(Rev.1) |
Management of the SG 17 Work Programme
|
Canada
|
Q1/17
|
2012-08-15 |
|
[ 696 ]
(Rev.1) |
Proposal to Modify Text of Question H/17
|
Canada
|
Q8/17
|
2012-08-15 |
|
[ 695 ]
|
Observations on draft Recommendation X.1541 (X.iodef), Incident object description exchange format
|
Russian Federation
|
Q4/17
|
2012-08-15 |
|
[ 694 ]
|
Guidance for Providing Confidence and Security on the base of IdM for e-Government Public Services
|
Russian Federation
|
Q10/17
|
2012-08-15 |
|
[ 693 ]
|
Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks for determination
|
Russian Federation
|
Q2/17
|
2012-08-15 |
|
[ 692 ]
|
Draft Recommendation of the ITU-T X.ncns-1 «Guidance for creating National IP-based public network security center for developing countries» for determination
|
Russian Federation
|
Q2/17
|
2012-08-15 |
|
[ 691 ]
|
Proposed Edits to clause 9&10 in X.ccsec
|
China
,
China Mobile Communications Corporation
|
Q8/17
|
2012-08-15 |
|
[ 690 ]
|
X.abnot: Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
,
ZTE Corporation
|
Q4/17
|
2012-08-15 |
|
[ 689 ]
|
1st Draft: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2012-08-15 |
|
[ 688 ]
|
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2012-08-15 |
|
[ 687 ]
|
Authentication integration solution for IMS scenario in X.authi - part 2.
|
China Mobile Communications Corporation
|
Q10/17
|
2012-08-15 |
|
[ 686 ]
|
Authentication integration solution for IMS scenario in X.authi - part 1.
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-08-15 |
|
[ 685 ]
|
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q3/17
|
2012-08-15 |
|
[ 684 ]
|
Background of X.websec-4 and clarification on the comments of C660
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q8/17, Q7/17
|
2012-08-15 |
|
[ 683 ]
(Rev.1) |
Comments on X.ccsec work item
|
Yaana Technologies, LLC
|
QALL/17, Q8/17
|
2012-08-15 |
|
[ 682 ]
|
Proposal for studying the use of System for Cross-domain Identity Management (SCIM) in telecommunications environment
The document should be reviewed jointly by Q10/17 and Q16/13
|
Alcatel-Lucent USA Inc.
|
Q10/17
|
2012-08-15 |
Results:756 total items. Result page:
-
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):