Documents Temporaires
(PLEN)
|
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 2576-PLEN ]
|
LS/o SG17 comments on to RevCom on reduction in number of groups [to RevCom]
|
Rapporteur Q1/17
|
Q1/17
|
2016-03-18 |
|
[ 2575-PLEN ]
|
The 3rd revised text for ITU-T X.sup-gpim, Code of practice for personally identifiable information protection based on ITU-T X.gpim for telecommunications organizations
|
Editors
|
Q3/17
|
2016-03-18 |
|
[ 2574-PLEN ]
(Rev.1-2) |
Using mailing list of Q1/17 in investigating new topics for SG17
|
Rapporteur Q1/17
|
PLEN/17
|
2016-03-18 |
|
[ 2573-PLEN ]
(Rev.1) |
Template for new work item X.voltesec-1 on "Security Framework for VoLTE Network Operation"
|
Editors
|
Q6/17, Q2/17
|
2016-03-18 |
|
[ 2572-PLEN ]
(Rev.1) |
Request for input to TD 2464, X.TRsuss "Technical Report on the successful use of security standards"
|
Editor
|
Q1/17
|
2016-03-18 |
|
[ 2571-PLEN ]
|
3rd revision of the draft Recommendation ITU-T X.sgsec-2, Security guidelines for Home Area Network (HAN) devices in Smart Grid systems
|
Editors
|
Q6/17
|
2016-03-18 |
|
[ 2570-PLEN ]
|
Draft Supplement on text of ITU-T X.sgsec-1: Security functional architecture for smart grid services using telecommunication networks (for agreement)
|
Editors
|
Q6/17
|
2016-03-18 |
|
[ 2569-PLEN ]
|
Draft new Supplement "Guidelines for using object identifiers (OID) for the Internet of Things"
|
Rapporteur Q11/17
|
Q11/17
|
2016-03-18 |
|
[ 2568-PLEN ]
(Rev.1) |
Proposal of NWI: X.1254rev "Entity authentication assurance framework"
|
Editor
|
Q10/17
|
2016-03-18 |
|
[ 2567-PLEN ]
|
LS/o on Standardization of OASIS Trust Elevation protocol [to OASIS]
|
ITU-T SG17 Q10/17
|
Q10/17
|
2016-03-18 |
|
[ 2566-PLEN ]
|
Keywords for Recommendation ITU-T X.1256 (X.authi), Guidelines and framework for sharing network authentication results with service applications
|
Rapporteur Q10/17
|
Q10/17
|
2016-03-18 |
|
[ 2565-PLEN ]
|
Withdrawn
|
N/A
|
N/A
|
2016-03-18 |
|
[ 2564-PLEN ]
(Rev.1) |
Updates to the Network Forensic and Vulnerability Organizations web page
|
Rapporteur Q4/17
|
Q4/17
|
2016-03-18 |
|
[ 2563-PLEN ]
|
LS/o/r on big data and digital identity [to ITU-T SG3]
|
ITU-T SG17 Q10/17
|
Q10/17
|
2016-03-18 |
|
[ 2562-PLEN ]
(Rev.1) |
Proposal for new baseline text for ITU-T X.1542 (ex X.simef): Session Information Message Exchange Format (for determination)
|
Editors
|
Q4/17
|
2016-03-18 |
|
[ 2561-PLEN ]
|
NWI proposal of X.metric, Metrics for Evaluating Threat and Resilience in Cyberspace
|
Rapporteur Q4/17
|
Q4/17
|
2016-03-18 |
|
[ 2560-PLEN ]
|
The revised draft for X.websec-8: "Secure protection guidelines of value-added service for operators"
|
Editors
|
Q7/17
|
2016-03-18 |
|
[ 2559-PLEN ]
|
Report of the Joint session of Q4/17 and Q10/17 on Addressing security challenges through IdM and cybersecurity standardization (16 March 2016)
|
Rapporteur Q4/17
|
Q4/17, Q10/17
|
2016-03-18 |
|
[ 2558-PLEN ]
(Rev.1) |
X.cms text for Consent
|
Editor
|
Q11/17
|
2016-03-18 |
|
[ 2557-PLEN ]
(Rev.1-2) |
Possible positioning of SG17 Questions for next study period
|
Vice-Chairman SG17
|
QALL/17, Q7/17, Q6/17
|
2016-03-18 |
|
[ 2556-PLEN ]
|
2nd revised text of ITU-T X.sup-gisb "Best practice for implementation of X.1054 | ISO/IEC 27014 on governance of information security; Case of Burkina Faso"
|
Editors
|
Q3/17
|
2016-03-18 |
|
[ 2555-PLEN ]
|
Discussion between Scott Mansfield (IETF liaison to ITU-T) and Martin Euchner (TSB) on "Strengthening collaboration between ITU-T and IETF on security standardization", 22 February 2016
|
TSB
|
PLEN/17
|
2016-03-18 |
|
[ 2554-PLEN ]
(Rev.1) |
Terms of Reference for Correspondence Group on Security and Privacy for IoT (CG-IoTsec)
|
Vice-Chairman SG17
,
Co-chairman special session
|
PLEN/17
|
2016-03-17 |
|
[ 2553-PLEN ]
(Rev.1) |
LS/o on techniques for improved end-user perception of trustworthiness indicators [to JCA-AHF]
|
ITU-T SG17
|
Q4/17
|
2016-03-17 |
|
[ 2552-PLEN ]
|
The 3rd revised baseline text for X.websec-7: A reference monitor for online analytics services
|
Editors
|
Q7/17
|
2016-03-17 |
|
[ 2551-PLEN ]
|
Proposal for new baseline text of work item: X.websec-6
|
Editors
|
Q7/17
|
2016-03-17 |
|
[ 2550-PLEN ]
|
Proposal for new baseline text of work item: X.sbb
|
Editors
|
Q4/17
|
2016-03-17 |
|
[ 2549-PLEN ]
|
Proposal for new work item on "Security Framework for VoLTE Network Operation"
|
Acting Rapporteur Q2/17
|
Q2/17
|
2016-03-17 |
|
[ 2548-PLEN ]
|
New baseline text of work item: X.samtn
|
Editors
|
Q4/17
|
2016-03-17 |
|
[ 2547-PLEN ]
|
Gap Analysis for Security Framework for VoLTE Network Operation
|
Acting Rapporteur Q2/17
|
Q2/17
|
2016-03-17 |
|
[ 2546-PLEN ]
|
Cybersecurity governance models
|
Rapporteur Q4/17
|
Q4/17
|
2016-03-17 |
|
[ 2545-PLEN ]
(Rev.1) |
LS/o on X.1254 Revision [to ISO/IEC JTC 1/SC 27 WG5]
|
ITU-T SG Q10/17
|
Q10/17
|
2016-03-17 |
|
[ 2544-PLEN ]
|
Proposal for new baseline text of work item: X.gsiiso (for consent)
|
Editors
|
Q2/17
|
2016-03-17 |
|
[ 2543-PLEN ]
(Rev.1-3) |
A template of a new work item ITU-T X.msec-11: Guidelines on mitigating the negative effects of infected terminals in mobile networks
|
Editors
|
Q6/17
|
2016-03-17 |
|
[ 2542-PLEN ]
|
Keywords for use in the revised X.1521, Common Vulnerability Scoring System 3.0
|
Rapporteur Q4/17
|
Q4/17
|
2016-03-17 |
|
[ 2541-PLEN ]
(Rev.1) |
The 3nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE, supplement to X.1245
|
Editors X.ticsc
|
Q5/17
|
2016-03-17 |
|
[ 2540-PLEN ]
|
Use Cases and Requirements for Security Considerations
|
Vice-Chairman SG17
|
PLEN/17
|
2016-03-17 |
|
[ 2539-PLEN ]
|
COM 20 - TD 255 Rev.1
|
TSB
|
Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17, Q3/17, Q2/17, Q12/17, Q11/17, Q10/17, Q1/17
|
2016-03-17 |
|
[ 2538-PLEN ]
|
The 3rd revised text for ITU-T X.msec-9, Functional security requirements and architecture for mobile phone anti-theft measures
|
Editor
|
Q6/17
|
2016-03-17 |
|
[ 2537-PLEN ]
|
The 2nd revised text for ITU-T X.iotsec-2, security framework for Internet of Things
|
Editor
|
Q6/17
|
2016-03-17 |
|
[ 2536-PLEN ]
(Rev.1) |
LS/o/r on SG17 comments on the 2nd CD of ITU-T X.gpim | ISO/IEC 29151 [to ISO/IEC JTC 1/SC 27/WG 5]
|
ITU-T SG17
|
Q3/17
|
2016-03-17 |
|
[ 2535-PLEN ]
|
The 8th revised text for common text ITU-T X.gpim | ISO/IEC 29151, Code of practice for Personally Identifiable Information protection
|
Editors
|
Q3/17
|
2016-03-17 |
|
[ 2534-PLEN ]
(Rev.1) |
The revised text of X.sgmvno, Security Guide for Mobile Virtual Network Operator (MVNO)
|
Editors
|
Q2/17
|
2016-03-17 |
|
[ 2533-PLEN ]
(Rev.1-2) |
Revised text of X.nessa, Access control models for incident exchange networks (for determination)
|
Rapporteur Q4/17
|
Q4/17
|
2016-03-16 |
|
[ 2532-PLEN ]
|
LS/o/r about updated information in the cloud computing standards roadmap [to ITU-T SG13 WP2]
|
Rapporteur Q8/17
|
Q8/17
|
2016-03-16 |
|
[ 2531-PLEN ]
(Rev.1) |
2nd revised text of draft Supplement ITU-T X.gcsfmpd: Supplement on guidance to assist in countering spam for mobile phone developers
|
Editors
|
Q5/17
|
2016-03-16 |
|
[ 2530-PLEN ]
(Rev.1-2) |
Template for new work item X.SRIaaS on "Security Requirements of Public Infrastructure as a Service (IaaS) in Cloud Computing"
|
Editors
|
Q8/17
|
2016-03-16 |
|
[ 2529-PLEN ]
(Rev.1-2) |
Revised draft text for X.cspim: Technical Requirements for Countering Instant Messaging Spam (SPIM)
|
Editors
|
Q5/17
|
2016-03-16 |
|
[ 2528-PLEN ]
|
Terms of Reference for the Correspondence Group on investigation for new topics for SG17 standardization
|
Chairman, special session on investigation
|
PLEN/17
|
2016-03-16 |
|
[ 2527-PLEN ]
(Rev.1-4) |
Proposal of NWI: Recommendation ITU-T <X.te> "Trust Elevation protocol"
|
Editor
|
Q10/17
|
2016-03-16 |
Resultats:418 documents Résultats :
Précédent -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):