Temporary Documents
�(WP2)
�� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 2409-WP2 ]
�
� |
Revision of draft text on X.websec-3, Security architecture for message security in mobile Web Services
�
� |
Editor
� |
Q9/17
� |
2006-09-13 |
|
[ 2408-WP2 ]
�
� |
Baseline document for further discussion of X.sap-2
�
� |
Editor
� |
Q9/17
� |
2006-09-13 |
|
[ 2407-WP2 ]
�
� |
ITU-T Candidate Recommendation X.sap-1 - Guideline on secure password-based authentication protocol with key exchange
�
� |
Editor
� |
Q9/17
� |
2006-09-13 |
|
[ 2406-WP2 ]
�
� |
Reply LS to SG 17 on Progress on X.oscip "Overview of countering spam for IP multimedia applications"
�
� |
Q.26/16 Rapp meeting
� |
Q6/17
� |
2006-09-12 |
|
[ 2405-WP2 ]
�
� |
Response to ITU-T COM 17-LS 107 and COM 17-LS 108
�
� |
Open Mobile Alliance
� |
Q9/17
� |
2006-09-04 |
|
[ 2404-WP2 ]
�
� |
Liaison Statement reply to ITU-T Study Group 17, Question 17 on countering spam by technical means
�
� |
ETSI TISPAN
� |
Q17/17
� |
2006-08-23 |
|
[ 2403-WP2 ]
�
� |
Response to the Liaison Statement from SG 17 Status of WTSA Resolution 50 Obligations
�
� |
ITU-T SG 13
� |
Q4/17
� |
2006-08-23 |
|
[ 2402-WP2 ]
�
� |
Response to a liaison statement from SG 17 entitled draft Recommendation X.ngn-akm
�
� |
ITU-T SG 13
� |
Q5/17
� |
2006-08-23 |
|
[ 2401-WP2 ]
�
� |
Liaison on information from Daidalos
�
� |
ITU-T SG 13
� |
Q6/17
� |
2006-08-23 |
|
[ 2400-WP2 ]
�
� |
Response to SG 17 re: WTSA Resolution 50 Obligations
�
� |
ITU-T SG 11
� |
Q4/17
� |
2006-08-23 |
|
[ 2399-WP2 ]
�
� |
Response to SG 17 re: SG Security Related Activities
�
� |
ITU-T SG 11
� |
Q4/17
� |
2006-08-23 |
|
[ 2398-WP2 ]
�
� |
Call for contributions to WG4 Study Period on Cyber security (27N5246)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q6/17
� |
2006-08-22 |
|
[ 2397-WP2 ]
�
� |
Text for ISO/IEC 2nd CD 19792 - Information technology - Security techniques - Security evaluation of biometrics (27N5121)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2006-08-21 |
|
[ 2396-WP2 ]
�
� |
Text for ISO/IEC 1st WD 24760 - Information technology - Security techniques - A framework for identity management (27N5205)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q6/17
� |
2006-08-21 |
|
[ 2395-WP2 ]
�
� |
Considering approval of the OASIS Common Alerting Protocol (CAP), v1.1 as an ITU-T Recommendation
�
� |
OASIS
� |
Q6/17
� |
2006-08-21 |
|
[ 2394-WP2 ]
�
� |
ISO/IEC FCD 27006 - Information technology - Security techniques - Requirements for the accreditation of bodies providing certification of information security management systems (27N5098)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17
� |
2006-09-04 |
|
[ 2393-WP2 ]
�
� |
Text for ISO/IEC 2nd CD 27005 - Information technology - Security techniques - Information security risk management (27N5096)
�
� |
ISO/IEC JTC 1/SC27
� |
Q7/17
� |
2006-08-21 |
|
[ 2392-WP2 ]
�
� |
Text for ISO/IEC 4th WD 27004 - Information technology - Security techniques - Information security management measurements (27N5094)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17
� |
2006-08-23 |
|
[ 2391-WP2 ]
�
� |
Text for ISO/IEC 2nd WD 27003 - Information technology - Security techniques - Information security managment system implementation guidance (27N5092)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17
� |
2006-08-21 |
|
[ 2390-WP2 ]
�
� |
Text for ISO/IEC 1st WD 27000 - Information technology - Security techniques - Information security management systems - Fundamentals and vocabulary (27N5090)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17
� |
2006-08-21 |
|
[ 2389-WP2 ]
�
� |
ISO/IEC 1st DE24761. Information technology security techniques - Authentification context for biometrics (27N5142)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2006-08-21 |
|
[ 2388-WP2 ]
�
� |
Dispositions of comment received on document SC27 N4864 - ISO/IEC 2nd WD 24761 - Information technology - Security techniques - Authentification context for biometrics [in response to ND and SC37 comments presented in SC27 N5028, N5086] (27N5141)
�
� |
ISO/IEC JTC 1/SC 21
� |
Q8/17
� |
2006-08-21 |
|
[ 2387-WP2 ]
�
� |
Liaison Statement to ITU-T SG 17 from ISO/IEC JTC1/SC37 (37N1745)
�
� |
ISO/IEC JTC 1/SC 37
� |
Q8/17
� |
2006-08-21 |
|
[ 2386-WP2 ]
�
� |
SC37 Standing Document 12 (SD 12), SC 37 Project Description Information (37N1743)
�
� |
ISO/IEC JTC 1/SC 37
� |
Q8/17
� |
2006-08-21 |
|
[ 2385-WP2 ]
�
� |
Liaison statement on Identity Mangement (27 N 5193)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q6/17
� |
2006-06-22 |
|
[ 2384-WP2 ]
�
� |
Liaison concerning X.1141 and X.1142
�
� |
ITU-T SG 4
� |
Q9/17
� |
2006-06-13 |
|
[ 2383-WP2 ]
�
� |
Liaison concerning Study Group 4 efforts in management of security
�
� |
ITU-T SG 4
� |
Q7/17
� |
2006-06-13 |
|
[ 2382-WP2 ]
�
� |
International standard "Health informatics -- Security management in health using ISO/IEC 17799"
�
� |
ISO TC 215 WG 4
� |
Q7/17
� |
2006-06-06 |
|
[ 2381-WP2 ]
�
� |
Liaison statement on Collaborative work on Cyber Security in response to SC27 N5082 (27 N 5108)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q6/17
� |
2006-06-06 |
|
[ 2380-WP2 ]
�
� |
Liaison statement on Collaborative work ON ISMS standards in response to SC27 N5083 (27 N 5106)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17
� |
2006-06-06 |
|
[ 2379-WP2 ]
�
(Rev.1)� |
Liaison statement on Collaborative work on IT Network security in response to SC27 N5081 (27 N 5167)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17, Q5/17
� |
2006-06-06 |
|
[ 2378-WP2 ]
�
� |
Liaison statement on Authentication context for biometrics and Biometric template protection (27 N 5167)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q8/17
� |
2006-06-06 |
|
[ 2377-WP2 ]
�
� |
Liaison statement on Working Group 3's work progress (27 N 5119rev1)
�
� |
ISO/IEC JTC 1/SC 27
� |
Q7/17, Q5/17
� |
2006-06-06 |
|
[ 2376-WP2 ]
�
� |
Focus Group "Security Baseline for Network Operators"
�
� |
ITU-T SG 2
� |
Q4/17
� |
2006-05-24 |
|
[ 2375-WP2 ]
�
� |
Response on Summary of ITU-T Study Groups Security Related Activities
�
� |
ITU-T SG 2
� |
Q4/17
� |
2006-05-24 |
|
[ 2374-WP2 ]
�
� |
Response on Status of WTSA Resolution 50 Obligations
�
� |
ITU-T SG 2
� |
Q4/17
� |
2006-05-24 |
|
[ 2373-WP2 ]
�
� |
Response on working definition of Cybersecurity (Ref.: COM 17 - LS 84)
�
� |
ITU-T SG 2
� |
Q6/17
� |
2006-05-24 |
|
[ 2372-WP2 ]
�
� |
Characterisations of spam
�
� |
ITU-T SG 2
� |
Q17/17
� |
2006-05-24 |
|
[ 2371-WP2 ]
�
� |
ASON Control Plane Session Security
�
� |
ITU-T SG 15
� |
Q9/17, Q7/17, Q6/17, Q5/17
� |
2006-05-24 |
|
[ 2370-WP2 ]
�
� |
Report on work on NGN security and draft new ITU-T Recommendations Y.NGN Security Requirements and Y.NGN.Authentication
�
� |
Q.15/13 Rapp Group, Kobe, April 06
� |
Q17/17, Q9/17, Q7/17, Q6/17, Q5/17
� |
2006-05-24 |
Results:190 total items. Result page:�
Previous�-�
1 -
2 -
3 -
4
� |
Multiple Document Download:�Formats and Languages to be included (when available):