Contribuciones
[ Origen: China ] |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 322 ]
|
Proposed draft Recommendation of X.giim
|
MIIT, China
|
Q10/17
|
2010-11-25 |
|
[ 321 ]
|
Comments on X.ics : Functions and interfaces for countering email spam sent by botnet
|
MIIT, China
|
Q5/17
|
2010-11-25 |
|
[ 320 ]
|
Updated text of X.msec-6: Security aspects of mobile phones
|
MIIT, China
|
Q6/17
|
2010-11-25 |
|
[ 319 ]
|
Proposal for a new work item on Content-based Classification in Messaging Services
|
MIIT China, China Unicom
|
Q5/17
|
2010-11-25 |
|
[ 317 ]
|
Proposal for update to X.oacms
|
Huawei, China Unicom
|
Q5/17
|
2010-11-25 |
|
[ 316 ]
|
Proposal for updated text to X.oacms
|
Huawei Technologies Co.,Ltd.; China Unicom
|
Q5/17
|
2010-11-25 |
|
[ 315 ]
|
Proposal for a new work item on Requirements and Framework of Secure Service Platform in Complex NAT Environments
|
Huawei Technologies Co., Ltd.; China Telecom; MIIT
|
Q8/17
|
2010-11-25 |
|
[ 314 ]
|
Proposal for revised draft text for X.bots : Frameworks for botnet detection and response
|
China Unicom
|
Q4/17
|
2010-11-25 |
|
[ 313 ]
|
Proposed modification to X.interfaces
|
China Unicom
|
Q2/17
|
2010-11-25 |
|
[ 312 ]
|
Proposed text of chapter 6 in X.msec-6
|
China Unicom
|
Q6/17
|
2010-11-25 |
|
[ 311 ]
|
Proposed infrastructure as services for X.ccsec
|
China Telecom, China
|
Q8/17
|
2010-11-25 |
|
[ 302 ]
|
Trust management evaluation criteria of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 301 ]
|
Trust management assumption of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 300 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 277 ]
|
New Work Item Proposal on security challenge analysis for cloud computing
|
CATR, MIIT, China
|
Q8/17
|
2010-03-29 |
|
[ 266 ]
|
User authentication mechanism of X.p2p-3
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 265 ]
|
Updated text of X.msec-6: Overview aspects of mobile phones
|
MIIT, China
|
Q6/17
|
2010-03-26 |
|
[ 264 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 263 ]
|
Proposed text in section 7 of X.tcs-1
|
MIIT, China
|
Q5/17
|
2010-03-26 |
|
[ 262 ]
|
A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG
|
MIIT, China
|
Q5/17
|
2010-03-26 |
|
[ 261 ]
|
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 260 ]
|
Proposed draft Rec. X.ismf, Information security management framework
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 259 ]
|
Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"
|
MIIT, China
|
Q6/17
|
2010-03-26 |
|
[ 258 ]
|
Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks
|
MIIT, China
|
Q5/17
|
2010-03-26 |
|
[ 257 ]
|
Organization and Personnel part in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 255 ]
(Rev.1) |
Proposed Application Scenarios to X.giim
|
MIIT, China
|
Q10/17
|
2010-03-26 |
|
[ 254 ]
|
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 253 ]
|
Clarify Some Issues on IdM in the Cloud Computing
|
MIIT, China
|
Q10/17
|
2010-03-26 |
|
[ 252 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2010-03-26 |
|
[ 251 ]
|
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
ZTE, China Mobile
|
Q4/17
|
2010-03-26 |
|
[ 248 ]
(Rev.1) |
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network
|
Huawei Technologies Co.,Ltd.
,
China Telecom
|
Q6/17
|
2010-03-26 |
|
[ 243 ]
|
Assets Management in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 242 ]
|
An analysis of X.authi: Authentication integration between the network and service layers
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 241 ]
|
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 180 ]
+Corr.1 |
Proposed text for section 6 of X.idmgen
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 179 ]
+Corr.1 |
Proposed text for authentication assurance interoperation in X.idm-ifa
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 178 ]
|
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 177 ]
|
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 176 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 175 ]
|
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 174 ]
+Corr.1 |
Proposed text for trust establishment in X.idm-ifa
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 165 ]
|
Proposed use cases for X.tb-ucr
|
CATR, MIIT, China
|
Q4/17
|
2009-09-07 |
|
[ 164 ]
|
Updated draft text on Recommendation X.tb-ucc: Traceback use cases and capabilities
|
CATR, MIIT, China
|
Q4/17
|
2009-09-07 |
|
[ 162 ]
+Corr.1 |
Proposal for a new work item on overview of security threats to and security mechanisms for smart phones
|
MIIT, China
|
Q6/17
|
2009-09-07 |
|
[ 161 ]
|
Comments on X.fcsip, Framework for countering spam in IP-based multimedia applications
|
MIIT, China
|
Q5/17
|
2009-09-07 |
|
[ 160 ]
|
Proposed a new work item on Generic IdM interoperability mechanisms
|
MIIT, China
|
Q10/17
|
2009-09-07 |
|
[ 105 ]
|
Basic concept for authentication mechanism of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
|
[ 104 ]
|
Draft Recommendation X.abnot: Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile, Huawei
|
Q4/17
|
2009-09-03 |
|
[ 103 ]
|
Draft Recommendation X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
|
[ 102 ]
|
Proposed draft Recommendation. X.ismf, Information security management framework
|
China Mobile
|
Q3/17
|
2009-09-03 |
Resultados :164 documentos Resultados :
Anterior -
1 -
2 -
3 -
4
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):