Uni�n Internacional de Telecomunicaciones UIT
EnglishFran�ais
Mapa Cont�ctenos Copia Imprimible
P�gina principal : UIT-T : SG 17 : Contribuciones� Nuevo�-� Busque los documentos de la reuni�n
UIT-T�SG 17� C�

UIT-T�SG 17

Seguridad

Periodo de estudios 2009

Resultados :756 documentos
Resultados :� Anterior�-� 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 �-�Siguiente Next
Contribuciones��Documents / Contributions

N�mero
T�tulo Origen AI/Cuesti�n
Fecha
[ 606 ]
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index � Korea (Rep. of) Q4/17 2012-02-07
[ 605 ]
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms � Korea (Rep. of) Q4/17 2012-02-07
[ 604 ]
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks � Korea (Rep. of) Q4/17 2012-02-07
[ 603 ]
Specific needs for PII management guidelines for telecommunication organizations � Korea (Rep. of) Q3/17 2012-02-07
[ 602 ]
Comments on SG17 working structure for the next study period � KDDI Corporation QALL/17 2012-02-07
[ 601 ]
Agreement from X.discovery CG Teleconference � United Kingdom Q10/17 2012-02-07
[ 600 ]
UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks � United Kingdom Q2/17 2012-02-07
[ 599 ]
A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2012-02-07
[ 598 ]
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China , China Unicom Q5/17 2012-02-07
[ 597 ]
Comments on X.ics: A practical reference model for countering email spam using botnet information � China Q5/17 2012-02-07
[ 596 ]
Proposal to establish a tutorial mechanism for new technologies � China QALL/17 2012-02-07
[ 595 ]
Updated text of X.msec-6: Security aspects of smartphones � China Q6/17 2012-02-07
[ 594 ]
Proposal on security requirements of digital distribution platforms of X.msec-6 � China Q6/17 2012-02-07
[ 593 ]
Updated text of X.oacms: Overall aspects of countering mobile messaging spam � China Q5/17 2012-02-07
[ 592 ]
Proposal on changing the title name of X.msec-6 back to smartphone � China , China Unicom Q6/17 2012-02-07
[ 591 ]
Proposal of new security requirements for cloud based telecommunication service X.srfctse � Electronics and Telecommunications Research Institute (ETRI) Q8/17 2012-02-07
[ 590 ]
Proposal for new security requirements of social networking � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2012-02-07
[ 589 ]
Security Protection of Customer Information in Telecom Operators � China Mobile Communications Corporation , ZTE Corporation Q3/17 2012-02-07
[ 588 ]
Authentication result transfer based on encrypted cookie for WLAN scenario � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-02-07
[ 587 ]
Interface of the abnormal traffic detection and control system � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. Q4/17 2012-02-07
[ 586 ]
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks � China Mobile Communications Corporation Q6/17 2012-02-07
[ 585 ]
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks" � China Mobile Communications Corporation Q6/17 2012-02-07
[ 584 ]
A Draft of Technology Involved in Countering Voice Spam-X.ticvs � China Mobile Communications Corporation Q5/17 2012-02-07
[ 583 ]
Authentication integration solution for WLAN scenario in X.authi. � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-02-07
[ 582 ]
Candidate Use Cases for Cloud Computing Security � Microsoft Corporation Q8/17 2012-02-07
[ 581 ]
(Rev.1)
Proposed modifications to draft Supplement: Users' guide for ITU-T X.1051 � KDDI Corporation Q3/17 2012-02-07
[ 580 ]
(Rev.1)
Proposed text of Clause7.4 to draft Recommendation of X.giim � Ministry of Industry and Information Technology (MIIT) Q10/17 2012-02-07
[ 579 ]
(Rev.1)
Proposal for refined text to draft Recommendation X.giim: Generic IdM interoperability mechanisms � Ministry of Industry and Information Technology (MIIT) Q10/17 2012-02-07
[ 578 ]
(Rev.1)
Proposal on security requirements of ubiquitous networking in NGN � ZTE Corporation Q6/17 2012-02-07
[ 577 ]
(Rev.1)
Revised text for chapter 14 in draft X.srfctse � ZTE Corporation Q8/17 2012-02-07
[ 576 ]
Propose a chapter on cloud security for X.srfctse � ZTE Corporation Q8/17 2012-02-07
[ 575 ]
(Rev.1)
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets � China Unicom Q7/17 2012-02-07
[ 574 ]
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Inter layer Messaging System � Ministry of Information and Communication Technology (MICT) Q4/17 2012-02-07
[ 573 ]
Key Pre-distribution Using Nonlinear Codes on Z4 for Mobile Ad Hoc Networks � Ministry of Information and Communication Technology (MICT) Q1/17 2012-02-07
[ 572 ]

Withdrawn
N/A (no se aplica) � Q4/17 2012-02-07
[ 571 ]
A New Architecture for Redirecting Intruders to Honeypots � Ministry of Information and Communication Technology (MICT) Q4/17 2012-02-07
[ 570 ]
(Rev.1)
Open identity trust framework - proposed changes � Microsoft Corporation Q10/17 2012-02-07
[ 569 ]
(Rev.1)
Proposal of draft for X.atag � KDDI Corporation Q10/17 2012-02-07
[ 568 ]
Propose the requirement of cloud storage security for X.srfctse � ZTE Corporation Q8/17 2012-02-07
[ 567 ]
(Rev.1)
Report of the Correspondence Group on COP17 (Child Online Protection/ITU-T SG17), September 2011-January 2012 � Yaana Technologies, LLC QALL/17 2012-02-06
[ 566 ]
Proposed text for security guidelines chapter of X.ccsec � China Telecommunications Corporation Q8/17 2012-02-06
[ 565 ]
Proposed text for security challenges chapter of X.ccsec � China Telecommunications Corporation Q8/17 2012-02-06
[ 564 ]
Proposed new work item on Requirements and framework of operational security for Cloud Computing � China , China Telecommunications Corporation , ZTE Corporation Q8/17 2012-02-06
[ 563 ]
(Rev.1)
Update proposal of X.p2p-4: Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks � KDDI Corporation Q7/17 2012-02-06
[ 562 ]
(Rev.1)
Proposal of a new work item "Secure application management framework for communication devices" � KDDI Corporation , Sony Corporation Q6/17 2012-02-06
[ 561 ]
(Rev.1)
Comments on X.ticvs (Technologies involved in countering voice spam in telecommunications organizations) � KDDI Corporation Q5/17 2012-02-06
[ 560 ]
(Rev.1-2)
Proposal on new appendix for X.msec-6 � China , China Unicom Q6/17 2012-02-06
[ 559 ]
(Rev.1)
The security threats of disclosure and congestion for ubiquitous networking � China Unicom Q6/17 2012-02-06
[ 558 ]
(Rev.1)
The security threats of eavesdropping and tamper for ubiquitous networking � China Unicom Q6/17 2012-02-06
[ 557 ]
(Rev.1)
The security threats of Denial of Service and abuse for ubiquitous networking � China Unicom Q6/17 2012-02-06
Resultados :756 documentos
Resultados :� Anterior�-� 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16 �-�Siguiente Next
Telecarga de m�ltiples documentos:�Marcar las casillas correspondientes a los documentos seleccionados, a continuaci�n pulsar "Telecargar"

Preferencias del usuario:
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):
P�ginas de navegaci�n HTML
Formatos �+�Otros formatos
Idiomas (m�ximo 2) �+�Multiling�e �
(E: ingl�s - F: franc�s - S: espa�ol - A: �rabe - C: chino - R: ruso)

Pruebe ITU Translate, la herramienta de traducci�n autom�tica de documentos
Comienzo de la p�gina�-� Comentarios�-� Cont�ctenos�-� Copyright � UIT�2008�Reservados todos los derechos
Contacto p�blico :� TSB EDH
Actualizado el :�2012-09-06