Temporary Documents
(PLEN)
[ Source: Editors ]  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 361-PLEN ]
|
Draft new Recommendation ITU-T X.tif (X.1092), Integrated framework for telebiometric data protection in e-health and telemedicines (for consent)
|
Editors
|
Q9/17
|
2013-04-25 |
|
[ 343-PLEN ]
|
Revised draft Recommendation X.msec-8: Secure application distribution framework for communication devices
|
Editors of X.msec-8
|
Q6/17
|
2013-04-24 |
|
[ 320-PLEN ]
|
Revised draft Recommendation X.sgsec-1 as a baseline document : Security functional architecture for smart grid services using telecommunication network
|
Editors of X.sgsec-1
|
Q6/17
|
2013-04-24 |
|
[ 307-PLEN ]
(Rev.1-3) |
New work item template for revision to ITU-T Recommendation X.1051
|
Editors
|
Q3/17
|
2013-04-24 |
|
[ 305-PLEN ]
(Rev.1) |
Draft text of X.gsiiso : Guidelines on security of the individual information service for operators
|
Editors
|
Q2/17
|
2013-04-24 |
|
[ 303-PLEN ]
|
Revised X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
Editors
|
Q5/17
|
2013-04-23 |
|
[ 302-PLEN ]
|
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
|
Editors
|
Q6/17
|
2013-04-23 |
|
[ 285-PLEN ]
|
The 1st revised text for Recommendation ITU-T X.sap-9, delegated non-repudiation architecture based on X.813
|
Editors
|
Q7/17
|
2013-04-23 |
|
[ 284-PLEN ]
(Rev.1) |
Revised draft text for X.goscc: Guidelines of operational security for cloud computing
|
Editors
|
Q8/17
|
2013-04-23 |
|
[ 280-PLEN ]
|
Draft Recommendation ITU-T X.cybex-beep, Use of BEEP for cybersecurity information exchange
|
Editors
|
Q4/17
|
2013-04-23 |
|
[ 278-PLEN ]
(Rev.1-4) |
NWI on Framework for the interoperable exchange of trusted services
|
Editors
|
Q10/17
|
2013-04-23 |
|
[ 276-PLEN ]
|
Draft Recommendation ITU-T X.cybex-tp, Transport protocols supporting cybersecurity information exchange
|
Editors
|
Q4/17
|
2013-04-23 |
|
[ 275-PLEN ]
|
Revised text for the draft Rec. ITU-T X.csmc, an iterative model for cybersecurity operation using CYBEX techniques
|
Editors
|
Q4/17
|
2013-04-23 |
|
[ 270-PLEN ]
|
Final draft for X.authi: Authentication Integration in IDM
|
Editors
|
Q10/17
|
2013-04-22 |
|
[ 269-PLEN ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
Editors
|
Q7/17
|
2013-04-22 |
|
[ 268-PLEN ]
(Rev.1) |
Draft new Supplement 20 to ITU-T X-series Recommendations - ITU-T X.1205 - Supplement on framework of security information sharing Draft new Supplement 20 (X.sisnego) to ITU-T X-series Recommendations - ITU-T X.1205 - Supplement on framework of security information sharing negotiation (for agreement)
|
Editors
|
Q4/17
|
2013-04-22 |
|
[ 256-PLEN ]
(Rev.1-3) |
Draft new Recommendation ITU-T X.ipv6-secguide (X.1037), Technical security guideline on deploying IPv6 (for consent)
|
Editors
|
Q2/17, (Q3/17)
|
2013-04-22 |
|
[ 251-PLEN ]
(Rev.1-2) |
Revised text for X.ccsec: Security framework for cloud computing
|
Editors
|
Q8/17
|
2013-04-22 |
|
[ 250-PLEN ]
|
The 3rd revised text for X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
|
Editors
|
Q7/17
|
2013-04-22 |
|
[ 237-PLEN ]
(Rev.1) |
Revised Draft text for Recommendation ITU-T X.sfcse: Security functional requirements for SaaS application environment
|
Editors
|
Q8/17
|
2013-04-19 |
|
[ 235-PLEN ]
|
The baseline text for Recommendation ITU-T X.sap-8, efficient multi-factor authentication mechanisms using mobile devices
|
Editors
|
Q7/17
|
2013-04-19 |
|
[ 231-PLEN ]
|
Text of Recommendation ITU-T X.1198: Virtual machine-based security platform for renewable IPTV service and content protection (for consent)
|
Editors
|
Q6/17
|
2013-04-19 |
|
[ 228-PLEN ]
|
The 7th revised text on draft Recommendation ITU-T X.eipwa, Guideline on techniques for preventing web-based attacks
|
Editors
|
Q4/17
|
2013-04-19 |
|
[ 227-PLEN ]
(Rev.1-2) |
2nd revised text for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
|
Editors
|
Q3/17
|
2013-04-19 |
|
[ 226-PLEN ]
(Rev.1) |
The 7th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of traceback mechanisms
|
Editors
|
Q4/17
|
2013-04-19 |
|
[ 225-PLEN ]
|
The 7th revised text of Recommendation ITU-T X.csi (X.1208): Guidelines for cybersecurity index (for determination)
|
Editors
|
Q4/17
|
2013-04-19 |
|
[ 203-PLEN ]
(Rev.1) |
ITU-T X.1205 - Supplement 18 on guidelines for abnormal traffic detection and control on IP-based telecommunication networks (for agreement)
|
Editors
|
Q4/17
|
2013-04-09 |
|
[ 200-PLEN ]
|
Revised text for X.ccsec: high-level security framework for cloud computing (output from the January 2013 Q8/17 interim Rapporteur meeting)
|
Editors
|
Q8/17
|
2013-04-05 |
|
[ 199-PLEN ]
|
Draft text of Recommendation ITU-T X.sfcse: Security functional requirements for SaaS application environment
|
Editors
|
Q8/17
|
2013-04-05 |
|
[ 198-PLEN ]
|
Revised draft text for X.goscc: Guidelines of operational security for cloud computing
|
Editors
|
Q8/17
|
2013-04-05 |
|
[ 188-PLEN ]
|
Draft Recommendation ITU-T X.ipv6-secguide
|
Editors
|
Q2/17, (Q3/17)
|
2013-04-02 |
|
[ 187-PLEN ]
(Rev.1-2) |
A.5 justification information for draft Recommendation ITU-T X.ipv6secguide
|
Editors
|
Q2/17, (Q3/17)
|
2013-04-02 |
|
[ 181-PLEN ]
|
Revised text for X.ccsec: high-level security framework for cloud computing
|
Editors
|
Q8/17
|
2013-03-26 |
|
[ 122-PLEN ]
|
The revised baseline document for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
|
Editors
|
Q3/17, (Q10/17)
|
2013-01-21 |
Results:34 total items.
|
Multiple Document Download: Formats and Languages to be included (when available):