Unión Internacional de Telecomunicaciones   UIT
English  Français
 
Mapa Contáctenos Copia Imprimible
  Página principal : UIT-T : SG 17 : Contribuciones  Nuevo -  Busque los documentos de la reunión
   
UIT-T SG 17  C 

UIT-T SG 17

Seguridad

Periodo de estudios 2009

Resultados :60 documentos
Resultados :  1 - 2  - Siguiente Next
Contribuciones  [ Origen: China Mobile ]   Documents / Contributions
 
Número 
Título Origen AI/Cuestión
Fecha
[ 691 ]  
 
Proposed Edits to clause 9&10 in X.ccsec     China , China Mobile Communications Corporation   Q8/17   2012-08-15
[ 690 ]  
 
X.abnot: Abnormal traffic detection and control guideline for telecommunication network     China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation   Q4/17   2012-08-15
[ 689 ]  
 
1st Draft: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2012-08-15
[ 688 ]  
 
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2012-08-15
[ 687 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 2.     China Mobile Communications Corporation   Q10/17   2012-08-15
[ 686 ]  
 
Authentication integration solution for IMS scenario in X.authi - part 1.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-08-15
[ 685 ]  
 
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-08-15
[ 589 ]  
 
Security Protection of Customer Information in Telecom Operators     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-02-07
[ 588 ]  
 
Authentication result transfer based on encrypted cookie for WLAN scenario     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 587 ]  
 
Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2012-02-07
[ 586 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 585 ]  
 
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 584 ]  
 
A Draft of Technology Involved in Countering Voice Spam-X.ticvs     China Mobile Communications Corporation   Q5/17   2012-02-07
[ 583 ]  
 
Authentication integration solution for WLAN scenario in X.authi.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 515 ]  
 
Authentication integration based on authentication gateway in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 514 ]  
 
Authentication integration based on network authentication result transfer in X.authi     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 513 ]  
 
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization     China Mobile Communications Corporation   Q3/17   2011-08-10
[ 512 ]  
 
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations     China Mobile Communications Corporation   Q5/17, Q4/17   2011-08-10
[ 511 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q4/17   2011-08-10
[ 510 ]  
 
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection     China Mobile Communications Corporation   Q5/17   2011-08-10
[ 509 ]  
 
Performance and Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2011-08-10
[ 508 ]  
 
Proposed draft Recommendation for X.authi: Authentication integration in IDM     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2011-08-10
[ 507 ]  
 
VoIP security mechanism of X.p2p-3     China , China Mobile Communications Corporation , ZTE Corporation   Q7/17   2011-08-10
[ 410 ]  
(Rev.1) 
Propose a chapter on virtualization security for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2011-03-29
[ 328 ]  
 
Propose an authentication method involving Authentication Router for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2010-11-25
[ 327 ]  
 
Propose a federation gateway for X.srfctse     ZTE Corporation, China Mobile   Q8/17   2010-11-25
[ 326 ]  
(Rev.1) 
Proposal for updating "Procedure of security policy distribution" section in X.gpn     ZTE, China Mobile   Q4/17   2010-11-25
[ 325 ]  
 
Proposal for new work item on security requirements and framework of ubiquitous networking     ZTE, China Unicom, China Mobile   Q6/17   2010-11-25
[ 302 ]  
 
Trust management evaluation criteria of X.p2p-3     China Mobile   Q7/17   2010-11-25
[ 301 ]  
 
Trust management assumption of X.p2p-3     China Mobile   Q7/17   2010-11-25
[ 300 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile   Q7/17   2010-11-25
[ 266 ]  
 
User authentication mechanism of X.p2p-3     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 264 ]  
 
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2010-03-26
[ 261 ]  
 
Proposed draft Recommendation for X.authi: Authentication Integration in IDM     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 260 ]  
 
Proposed draft Rec. X.ismf, Information security management framework     China Mobile   Q3/17   2010-03-26
[ 257 ]  
 
Organization and Personnel part in X.ismf     China Mobile   Q3/17   2010-03-26
[ 254 ]  
 
Comparing analysis of abnormal traffic system deployment solutions in X.abnot     China Mobile, Huawei   Q4/17   2010-03-26
[ 252 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2010-03-26
[ 251 ]  
 
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     ZTE, China Mobile   Q4/17   2010-03-26
[ 243 ]  
 
Assets Management in X.ismf     China Mobile   Q3/17   2010-03-26
[ 242 ]  
 
An analysis of X.authi: Authentication integration between the network and service layers     China Mobile, China MII, ZTE   Q10/17   2010-03-26
[ 241 ]  
 
A solution to solve the repeated clean problem in the abnormal traffic control system deployment     China Mobile, Huawei   Q4/17   2010-03-26
[ 180 ]  
+Corr.1 
Proposed text for section 6 of X.idmgen     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 179 ]  
+Corr.1 
Proposed text for authentication assurance interoperation in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 178 ]  
 
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 177 ]  
 
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 176 ]  
 
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 175 ]  
 
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security     China Mobile, ZTE   Q4/17   2009-09-07
[ 174 ]  
+Corr.1 
Proposed text for trust establishment in X.idm-ifa     China Mobile, ZTE Corporation   Q10/17   2009-09-07
[ 105 ]  
 
Basic concept for authentication mechanism of P2P-based telecommunication network     China Mobile, China MII, ZTE   Q7/17   2009-09-03
Resultados :60 documentos
Resultados :  1 - 2  - Siguiente Next
 
Telecarga de múltiples documentos: Marcar las casillas correspondientes a los documentos seleccionados, a continuación pulsar "Telecargar"
   
 
Preferencias del usuario: 
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):
Páginas de navegación HTML  
Formatos  + Otros formatos
Idiomas (máximo 2)  + Multilingüe  
(E: inglés - F: francés - S: español - A: árabe - C: chino - R: ruso)

Pruebe ITU Translate, la herramienta de traducción automática de documentos
Comienzo de la página -  Comentarios -  Contáctenos -  Copyright © UIT 2008 Reservados todos los derechos
Contacto público :  TSB EDH
Actualizado el : 2024-5-7