International Telecommunication Union   ITU
Français  Español
 
Site map Contact Us Print version
  Home : ITU-T : SG 17 : Contributions  Recently posted -  Search Meeting Documents
   
ITU-T SG 17  C 

ITU-T SG 17

Security

Study Period 2009

Results:40 total items.
Contributions  [ AI/Question: Q2/17 ]   Documents / Contributions
 
Number 
Title Source AI/Question
Date
[ 422 ]  
 
Propose draft text for X.gsiiso: Guidelines on security of the individual information service for operators     CATR, MIIT, China   Q2/17   2011-03-30
[ 379 ]  
 
Draft Recommendation ITU-T X.rev, Architectural systems for security controls for preventing fraudulent activities in public carrier networks     Administration of the Russian Federation   Q2/17   2011-03-24
[ 377 ]  
 
Heterarchic architecture for secure distributed service networks     Administration of the Russian Federation   Q7/17, Q2/17, Q10/17   2011-03-25
[ 375 ]  
 
Draft ITU-T Recommendation X.ncns-1, National IP-based public network security center for developing countries     Administration of the Russian Federation   Q2/17   2011-03-24
[ 370 ]  
 
Revised text of X.gsiiso : Guidelines on security of the individual information service for operators     CATR, MIIT, China   Q2/17   2010-11-29
[ 346 ]  
 
Draft text of Recommendation ITU-T X.1034 (revised) for consent     Korea (Republic of)   Q2/17   2010-11-26
[ 330 ]  
 
Direction on Studies related to Revenue Assurance     UK   Q2/17   2010-11-26
[ 313 ]  
 
Proposed modification to X.interfaces     China Unicom   Q2/17   2010-11-25
[ 285 ]  
 
Comments on draft Rec. ITU-T X.1032 (COM 17-R15) under TAP     France Telecom Orange   Q2/17   2010-10-11
[ 220 ]  
 
A proposal for the 3rd draft text of revised Recommendation ITU-T X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network     Korea (Republic of)   Q2/17   2010-03-26
[ 130 ]  
 
Proposal for the 2nd draft text for revised Recommendation X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network     Korea (Republic of)   Q2/17   2009-09-04
[ 112 ]  
 
Comments on draft Recommendation X.interfaces     Germany   Q2/17   2009-09-04
[ 89 ]  
 
Proposal of new work item about the creation the basic rules to create the system to protect TELCO from fraud and revenue leakage. "Revenue leakage protection"     Telecommunications Administration of Russian Federation   Q2/17, Q1/17   2009-08-31
[ 53 ]  
 
Proposal for the first draft text of Recommendation X.1034, Amd. 1 : Guideline on extensible authentication protocol based authentication and key management in a data communication network     Korea   Q2/17   2009-02-02
[ 5 ]  
 
Proposal for new work item on the guide of security of the individual information service for operators     China MIIT , China Mobile   Q2/17   2009-02-02
Results:40 total items.
 
Multiple Document Download: Check the boxes of the selected documents, then click "Zip and download"
   
 
User preferences: 
Multiple Document Download: Formats and Languages to be included (when available):
HTML Navigation Pages  
Formats  + Other formats
Languages (maximum 2)  + Multilingual 
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)
Top -  Feedback -  Contact Us -  Copyright © ITU 2008 All Rights Reserved
Contact for this page :  TSB EDH
Updated : 2017-8-21