Union Internationale des Télécommunications   UIT
English  Español
 
Plan du site Contactez-nous Copie Imprimable
  Page d'accueil : UIT-T : SG 17 : Contributions  Ajoutés récemment -  Recherche de documents de réunion
   
UIT-T SG 17  C 

UIT-T SG 17

Sécurité

Période d'études 2013

Resultats:52 documents
Résultats :  1 - 2  - Suivant Next
Contributions  [ Source: China Mobile Communications Corporation ]   Documents / Contributions
 
Numéro 
Titre Source AI/Question
Date
[ 605 ]  
 
Proposal for a new work item: Technical Framework for Countering Telephone Fraud     China , China Mobile Communications Corporation , China Unicom   Q5/17   2016-08-16
[ 576 ]  
(Rev.1) 
Proposed new work item-- Guidelines on security of big data platform services in cloud computing     China , China Mobile Communications Corporation   Q8/17   2016-08-16
[ 574 ]  
 
Proposal for a new work item on Security Requirements of Network as a Service (NaaS) in Cloud Computing     China Mobile Communications Corporation , China Unicom   Q8/17   2016-08-16
[ 565 ]  
(Rev.1-2) 
Proposal for a new work item: Risk control on the assets accessible by the internet for the telecommunication organizations     China Mobile Communications Corporation , China Unicom   Q3/17   2016-08-15
[ 564 ]  
(Rev.1-2) 
Proposal for a new work item: Security requirements for communication as a service application environments     China , China Mobile Communications Corporation   Q8/17   2016-08-15
[ 563 ]  
(Rev.1-3) 
Applying for the agreement of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE, supplement to X.1245     China Mobile Communications Corporation , China Unicom   Q5/17   2016-08-15
[ 562 ]  
(Rev.1-3) 
The finalized draft for determination of X.msec-11: Guidelines on mitigating the negative effects of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2016-08-15
[ 561 ]  
(Rev.1) 
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators)     China Mobile Communications Corporation   Q7/17   2016-08-15
[ 560 ]  
 
Proposal for the 4th revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Unicom , ZTE Corporation   Q6/17, Q2/17   2016-08-14
[ 544 ]  
 
Proposal for a new work item to ITU-T Recommendation X DSMM     Alibaba China Co. Ltd. , China Mobile Communications Corporation , China Unicom , ZTE Corporation   Q2/17, (Q3/17)   2016-03-01
[ 526 ]  
 
Proposed new work item on Security Framework for VoLTE Operation     China Mobile Communications Corporation   Q2/17   2016-02-29
[ 496 ]  
(Rev.1-2) 
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators)     China Mobile Communications Corporation   Q7/17   2016-02-27
[ 495 ]  
(Rev.1-3) 
The 3rd draft of X.ticsc: Technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE), supplement to X.1245     China Mobile Communications Corporation   Q5/17   2016-02-27
[ 494 ]  
(Rev.1-2) 
A proposal of new work item: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2016-02-27
[ 477 ]  
 
Proposal for the 2nd revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Unicom , ZTE Corporation   Q2/17   2016-02-23
[ 446 ]  
 
2nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE     China Mobile Communications Corporation   Q5/17   2015-08-26
[ 425 ]  
(Rev.1) 
Security reference architecture for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation   Q2/17   2015-08-25
[ 424 ]  
 
Security threats and security requirements for SDN Resource-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation   Q2/17   2015-08-25
[ 423 ]  
 
Security threats and security requirements for SDN Application-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking.     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation   Q2/17   2015-08-25
[ 422 ]  
 
Security threats and security requirements for SDN Resource Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation   Q2/17   2015-08-25
[ 421 ]  
 
Security threats and security requirements for SDN Control Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking     Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation   Q2/17   2015-08-25
[ 399 ]  
 
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators     China Mobile Communications Corporation , Electronics and Telecommunications Research Institute (ETRI) , ZTE Corporation   Q7/17   2015-08-24
[ 372 ]  
(Rev.1) 
Draft Recommendation ITU-T X.authi: Guidelines and framework for sharing network authentication results with service applications     China Mobile Communications Corporation   Q10/17   2015-03-26
[ 320 ]  
 
A proposal for text improvement of X.msec-7     China Mobile Communications Corporation   Q6/17   2015-03-19
[ 319 ]  
 
Gap Analysis between IETF STIR [rfc7375] and X.ticvs to assist the finalization of X.ticvs     China Mobile Communications Corporation   Q5/17   2015-03-19
[ 318 ]  
(Rev.1-4) 
First Draft of X.ticsc, Supplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE     China Mobile Communications Corporation , China Unicom   Q5/17   2015-03-19
[ 289 ]  
 
Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE     China Mobile Communications Corporation   Q5/17   2014-09-03
[ 288 ]  
 
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2014-09-03
[ 287 ]  
(Rev.1) 
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2014-09-03
[ 285 ]  
(Rev.1) 
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network     China Mobile Communications Corporation   Q7/17   2014-09-03
[ 284 ]  
(Rev.1) 
Proposals to protect the PII data in X.gpim     China Mobile Communications Corporation   Q3/17   2014-09-03
[ 283 ]  
 
Draft X.authi: Guideline to implement the integration of service authentication with network authentication     China Mobile Communications Corporation   Q10/17   2014-09-03
[ 183 ]  
(Rev.1) 
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks     China Mobile Communications Corporation   Q6/17   2013-12-31
[ 180 ]  
(Rev.1) 
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2013-12-31
[ 179 ]  
(Rev.1) 
X.authi: Guideline to implement the authentication integration of the network layer and the service layer     China Mobile Communications Corporation , China , ZTE Corporation   Q10/17   2013-12-31
[ 178 ]  
(Rev.1) 
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"     China Mobile Communications Corporation   Q3/17   2013-12-31
[ 156 ]  
 
Comments on the new work item X.tfcmm     China Mobile Communications Corporation   Q5/17   2013-08-15
[ 155 ]  
 
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2013-08-15
[ 77 ]  
(Rev.1) 
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based networks     China Mobile Communications Corporation   Q4/17   2013-04-03
[ 76 ]  
(Rev.1) 
Difference between the PII (personally identifiable information) in mobile telecom network and that in traditional systems     China Mobile Communications Corporation   Q3/17   2013-04-03
[ 74 ]  
(Rev.1) 
Proposal for updating the text of sub-section into X.gpim     China Mobile Communications Corporation   Q3/17   2013-04-03
[ 72 ]  
(Rev.1) 
Proposal text for section 8.4 "Digital right management mechanism in streaming service" in X.p2p-3     China Mobile Communications Corporation   Q7/17   2013-04-03
[ 70 ]  
(Rev.1) 
Sample analysis of mobile malicious software     China Mobile Communications Corporation   Q6/17   2013-04-03
[ 68 ]  
(Rev.1) 
Proposed text of Clause 10 and bibliography in X.authi     China Mobile Communications Corporation   Q10/17   2013-04-03
[ 66 ]  
(Rev.1) 
IdM requirements for X.idmcc chap7     China Mobile Communications Corporation   Q10/17   2013-04-03
[ 64 ]  
(Rev.1) 
IdM requirements for X.idmcc chap8     China Mobile Communications Corporation   Q10/17   2013-04-03
[ 63 ]  
(Rev.1) 
Proposed edits to X.goscc     China Mobile Communications Corporation   Q8/17   2013-04-03
[ 61 ]  
(Rev.1) 
Comments on the latest draft of X.goscc     China Mobile Communications Corporation   Q8/17   2013-04-03
[ 59 ]  
(Rev.1) 
Proposal of new work item: Framework of on-demand cloud security     China Mobile Communications Corporation   Q8/17   2013-04-03
[ 57 ]  
(Rev.1-2) 
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China Mobile Communications Corporation   Q5/17   2013-04-03
Resultats:52 documents
Résultats :  1 - 2  - Suivant Next
 
Téléchargement de multiples documents: Cocher les cases correspondant aux documents sélectionnés, puis appuyer sur "Télécharger"
   
 
Préférences utilisateur: 
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):
Pages de navigation HTML  
Formats  + Autres formats
Langues (maximum 2)  + Multilingue 
(E: Anglais - F: Français - S: Espagnol - A: Arabe - C: Chinois - R: Russe)

Testez ITU Translate pour la traduction automatique de documents
Début de page -  Commentaires -  Contactez-nous -  Droits d'auteur © UIT 2008 Tous droits réservés
Contact pour cette page :  TSB EDH
Mis à jour le : 2024-5-30