Contributions
[ AI/Question: Q7/17 ]  |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 607 ]
|
Proposal for X.websec-6: content revise for improvement
|
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-08-16 |
|
[ 606 ]
|
Proposal for a new work item: Security Requirements and Framework for Big Data Analysis in Mobile Internet Services
|
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-08-16 |
|
[ 578 ]
|
NWIP: "Guidelines on hybrid authentication and key management mechanisms in the client-server model"
|
Korea (Rep. of)
|
Q7/17
|
2016-08-16 |
|
[ 577 ]
|
A new work item proposal for framework of de-identification processing service
|
Korea (Rep. of)
|
Q7/17
|
2016-08-16 |
|
[ 561 ]
(Rev.1) |
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators)
|
China Mobile Communications Corporation
|
Q7/17
|
2016-08-15 |
|
[ 559 ]
|
A proposed text for clause 8 and related appendix for draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-08-12 |
|
[ 549 ]
|
Proposal to Merge Draft Question F/17 and G/17
|
United States
|
Q7/17, Q6/17, PLEN/17
|
2016-03-01 |
|
[ 536 ]
|
Minimum requirements for the implementation of information security insurance
|
Iran (Islamic Republic of)
,
Ministry of Information & CommunicationTechnology
|
Q7/17, Q4/17
|
2016-02-29 |
|
[ 535 ]
|
A proposed method for the protection of controlling program in the reference monitor
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-02-29 |
|
[ 531 ]
|
A proposed metadata architecture for video analysis services
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-02-29 |
|
[ 530 ]
(Rev.1) |
A proposed 3rd baseline text of draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor
|
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-02-29 |
|
[ 504 ]
|
NWIP: "Guidelines on hybrid authentication and key management mechanisms with unbalanced computational capability"
|
Korea (Rep. of)
|
Q7/17
|
2016-02-29 |
|
[ 503 ]
|
A proposal for additional description on circle-of-trust (CoT)
|
Korea (Rep. of)
|
Q10/17, (Q7/17)
|
2016-02-29 |
|
[ 502 ]
(Rev.1-2) |
Propose new text of X.websec-6
|
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2016-02-28 |
|
[ 496 ]
(Rev.1-2) |
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators)
|
China Mobile Communications Corporation
|
Q7/17
|
2016-02-27 |
|
[ 468 ]
|
Requirements on big data and digital identity
|
Côte d'Ivoire
,
Sudan
|
Q7/17, Q10/17
|
2016-01-26 |
|
[ 464 ]
|
A proposal for the seventh draft Recommendation of ITU-T X.sap-5: Guidelines on local linkable anonymous authentication for electronic services
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-08-26 |
|
[ 454 ]
|
Propose new text of X.websec-6: Security framework and requirements for open capabilities of telecommunication services
|
China Unicom
|
Q7/17
|
2015-08-26 |
|
[ 426 ]
|
A proposal for clauses 7 of draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-08-25 |
|
[ 415 ]
|
Text for Recommendation ITU-T X.1157 (X.sap-7) (for approval)
|
Korea (Rep. of)
|
Q7/17
|
2015-08-25 |
|
[ 414 ]
|
Proposal for the 2nd revised text for draft Recommendation X.websec-7: A reference monitor for online analytics services
|
Korea (Rep. of)
|
Q7/17
|
2015-08-25 |
|
[ 399 ]
|
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators
|
China Mobile Communications Corporation
,
Electronics and Telecommunications Research Institute (ETRI)
,
ZTE Corporation
|
Q7/17
|
2015-08-24 |
|
[ 370 ]
|
A proposed text of draft Recommendation ITU-T X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-03-26 |
|
[ 352 ]
(Rev.1) |
Proposal for X.websec-6: add contents of clause 7
|
China Unicom
|
Q7/17
|
2015-03-25 |
|
[ 351 ]
(Rev.1) |
Proposal for X.websec-6: add contents of clause 6
|
China Unicom
|
Q7/17
|
2015-03-25 |
|
[ 350 ]
(Rev.1) |
Propose skeleton for X.websec-6
|
China Unicom
|
Q7/17
|
2015-03-25 |
|
[ 349 ]
(Rev.1) |
Proposal for a new work item: Security Requirements Framework and Framework Requirements for Big Data Analysis in Mobile Internet Services
|
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-03-25 |
|
[ 343 ]
|
A Proposed text of clause 8.2 ITU-T X.p2p-3: security requirements and mechanisms of P2P-based telecommunication network
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-03-24 |
|
[ 333 ]
|
A Proposed baseline text of ITU-T X.websec-7: A reference monitor for online analytics services
|
Korea (Rep. of)
|
Q7/17
|
2015-03-20 |
|
[ 327 ]
|
A proposal for 1st text of draft Recommendation ITU-T X.eaaa, Enhanced entity authentication based on aggregated attributes
|
Korea (Rep. of)
|
Q7/17, Q10/17
|
2015-03-20 |
|
[ 304 ]
|
A proposal for the sixth draft Recommendation of ITU-T X.sap-5
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2014-09-04 |
|
[ 303 ]
(Rev.1-2) |
New work item for enhanced user authentication based on user-centric attribute aggregation
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17, Q10/17
|
2014-09-04 |
|
[ 285 ]
(Rev.1) |
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile Communications Corporation
|
Q7/17
|
2014-09-03 |
|
[ 276 ]
|
Proposal for a new work item: Security Framework and Requirements for Telecom Service Capability Open
|
China Unicom
|
Q7/17
|
2014-09-03 |
|
[ 258 ]
|
A proposal for the final text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
|
Korea (Rep. of)
|
Q7/17
|
2014-09-02 |
|
[ 253 ]
|
A new work item proposal for reference monitor for online analytics applications
|
Korea (Rep. of)
|
Q7/17
|
2014-09-02 |
|
[ 252 ]
|
A proposal for clause 6, 7 and 8 in the 5th draft text for Recommendation ITU-T X.sap-8: Multi-factor authentication mechanisms based on a mobile device
|
Korea (Rep. of)
|
Q7/17
|
2014-09-02 |
|
[ 251 ]
|
Proposal of the 5th draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813
|
Korea (Rep. of)
|
Q7/17
|
2014-09-02 |
|
[ 246 ]
|
The 5th revised text of X.sap-8: Multi-factor authentication mechanisms based on a mobile device
|
Korea (Rep. of)
|
Q7/17
|
2014-09-02 |
|
[ 221 ]
|
Comparison of new work item and X.atag
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17, Q10/17
|
2014-01-02 |
|
[ 213 ]
(Rev.1) |
Proposal of the 3rd draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813
|
Korea (Rep. of)
|
Q7/17
|
2014-01-02 |
|
[ 208 ]
(Rev.1-2) |
Proposal for supplement to X.1144 - Enhancements and new features in XACML 3.0
|
Korea (Rep. of)
|
Q7/17, Q10/17
|
2014-01-02 |
|
[ 206 ]
(Rev.1) |
A proposal for the 3rd revised text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2014-01-02 |
|
[ 202 ]
(Rev.1) |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2014-01-02 |
|
[ 200 ]
(Rev.1) |
Final text of draft Recommendation ITU-T X.websec-5: Security framework for web mashup services (for agreement)
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2014-01-01 |
|
[ 177 ]
(Rev.1-3) |
A proposal of new work item : reference monitor for online analytics applications
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2013-12-31 |
|
[ 171 ]
|
A proposal of new work item: Supplement on cryptographic protocols and its verification
|
KDDI Corporation
|
Q7/17, Q1/17
|
2013-12-30 |
|
[ 150 ]
(Rev.1) |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 145 ]
(Rev.1) |
A proposal for the 4th revised text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
|
[ 143 ]
(Rev.1) |
A proposal for X.sap-7's Annex I: Monitoring information for the detection of fraud activities
|
Korea (Rep. of)
|
Q7/17
|
2013-08-14 |
Results:65 total items. Result page:
1 -
2
- Next

|
Multiple Document Download: Formats and Languages to be included (when available):