Contributions�� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 306 ]
�
+Add.1� |
Draft revisions to Recommendation Z.150 (02/03) User Requirements Notation (URN) - Language requirements and framework
�
� |
Canada
� |
Q14/17, Q13/17, Q12/17
� |
2010-11-25 |
|
[ 305 ]
�
� |
UK Comments on X.673
�
� |
UK
� |
Q12/17
� |
2010-11-26 |
|
[ 304 ]
�
� |
Editorial changes on draft Rec. ITU-T X.673 (COM 17-R22) under TAP
�
� |
France Telecom Orange
� |
Q12/17
� |
2010-11-25 |
|
[ 303 ]
�
� |
Proposal for revised text of clauses 6, 6.3, 7.3.3, and 8.3 in X.iptvsec-3: Key management framework for secure IPTV services
�
� |
Deutsche Telekom AG
� |
Q6/17
� |
2010-11-25 |
|
[ 302 ]
�
� |
Trust management evaluation criteria of X.p2p-3
�
� |
China Mobile
� |
Q7/17
� |
2010-11-25 |
|
[ 301 ]
�
� |
Trust management assumption of X.p2p-3
�
� |
China Mobile
� |
Q7/17
� |
2010-11-25 |
|
[ 300 ]
�
� |
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile
� |
Q7/17
� |
2010-11-25 |
|
[ 299 ]
�
� |
Proposal of a baseline model for clause 11 of X.sap-4
�
� |
Hitachi, Ltd
� |
Q7/17, Q10/17
� |
2010-11-25 |
|
[ 298 ]
�
� |
Germany's comments on the draft new Recommendation X.tcs-2
�
� |
Germany
� |
Q5/17
� |
2010-11-25 |
|
[ 297 ]
�
� |
Proposal for modification on ITU-T Recommendation ITU-T X.1500 [X.cybex], Cybersecurity information exchange framework
�
� |
Germany
� |
Q4/17
� |
2010-11-25 |
|
[ 296 ]
�
� |
Proposal of a new work item for the general framework of device authentication in peer-to-peer communications
�
� |
KDDI Corporation
� |
Q7/17
� |
2010-11-25 |
|
[ 295 ]
�
� |
Comments for draft Recommendation X.msec-6: Security aspects of mobile phones
�
� |
KDDI Corporation
� |
Q6/17
� |
2010-11-25 |
|
[ 294 ]
�
� |
Survey of Standardizing in ISO/TC 215 for X.tif
�
� |
Japan
� |
Q9/17
� |
2010-11-25 |
|
[ 293 ]
�
� |
Technical contributions for ITU-T draft Recommendation X.gep: A guideline for evaluating telebiometric template protection techniques
�
� |
Japan
� |
Q9/17
� |
2010-11-25 |
|
[ 292 ]
�
� |
A draft proposed text for Recommendation ITU-T X.sgsm, Information security management guidelines for small and medium telecommunication organizations
�
� |
Japan
� |
Q3/17
� |
2010-11-25 |
|
[ 291 ]
�
� |
Comments on the draft Recommendation X.tcs-2: Real-time blocking list (RBL)-based framework for countering VoIP spam
�
� |
NICT
� |
Q5/17
� |
2010-11-25 |
|
[ 290 ]
�
� |
Challenges to open networks: what strategies? Development of a "defense in depth" regulatory framework
�
� |
Information and Communication Technologies
,
Authority of Mauritius
� |
Q4/17
� |
2010-11-22 |
|
[ 289 ]
�
(Rev.1)� |
Comments on draft Rec. ITU-T X.1275 (COM 17-R21) under TAP
�
� |
France Telecom Orange
� |
Q10/17
� |
2010-11-11 |
|
[ 288 ]
�
� |
Enhancing Cybersecurity for Future Networks: automated security use case
�
� |
Yaana Technologies, LLC
� |
Q4/17
� |
2010-11-09 |
|
[ 287 ]
�
(Rev.1)� |
Revised version of Rec. ITU-T X.660
�
� |
France Telecom Orange
� |
Q12/17, Q11/17
� |
2010-11-08 |
|
[ 286 ]
�
� |
Proposed draft Recommendation ITU-T X.ssaf, Security standards availability framework
�
� |
Yaana Technologies, LLC
� |
Q4/17
� |
2010-11-05 |
|
[ 285 ]
�
� |
Comments on draft Rec. ITU-T X.1032 (COM 17-R15) under TAP
�
� |
France Telecom Orange
� |
Q2/17
� |
2010-10-11 |
|
[ 284 ]
�
� |
Amendments to draft ITU-T Recommendation X.673
�
� |
UK
� |
Q12/17
� |
2010-09-09 |
|
[ 283 ]
�
� |
ITU-T & ISO Collaboration
�
� |
Canada
� |
Q10/17
� |
2010-10-07 |
|
[ 282 ]
�
� |
The offer on working out of the new Recommendation representing base rules on creation of system of protection of telecommunication operators from revenue leakage. "Revenue leakage protection"
�
� |
Ministry of Communication and
,
Informatization of the Russian Federation
� |
Q1/17
� |
2010-04-01 |
|
[ 281 ]
�
(Rev.1)� |
Proposal of new work item to develop a communication protocol between applications for additional information of content in inappropriate content protection systems
�
� |
Telecommunications Administration of Russian Federation
� |
Q7/17
� |
2010-04-01 |
|
[ 280 ]
�
� |
Privacy (Data Protection). Personal Information Management System - Requirements for Telecommunications (PIMS-T)
�
� |
Telecommunications Administration of Russian Federation
� |
Q3/17
� |
2010-04-01 |
|
[ 279 ]
�
� |
National network security center (NNSC) for IP-based public networks in developing countries
�
� |
Telecommunications Administration of Russian Federation
� |
Q3/17
� |
2010-04-01 |
|
[ 278 ]
�
� |
Proposal of a new work item on creation of decentralized name resolution system architecture for global IP-networks
�
� |
Telecommunications Administration of Russian Federation
� |
Q12/17, Q10/17
� |
2010-04-01 |
|
[ 277 ]
�
� |
New Work Item Proposal on security challenge analysis for cloud computing
�
� |
CATR, MIIT, China
� |
Q8/17
� |
2010-03-29 |
|
[ 276 ]
�
� |
UK comments on the progression of ITU-T X.oid-res and related documents
�
� |
UK
� |
Q12/17
� |
2010-03-29 |
|
[ 275 ]
�
� |
UK comments on the Proposed text for ITU-T X.oid-res - Supplement on procedures for the operation of the .oid-res.org maintenance agency
�
� |
UK
� |
Q12/17
� |
2010-03-29 |
|
[ 274 ]
�
� |
Proposed changes to TD 0771, ballot text for ISO/IEC 29168 (Draft Recommendation ITU-T X.oid-res)
�
� |
UK
� |
Q12/17
� |
2010-03-29 |
|
[ 273 ]
�
� |
Proposal for revised text of clause 7 in X.iptvsec-4: Algorithm selection scheme for SCP descrambling
�
� |
ETRI
� |
Q6/17
� |
2010-03-29 |
|
[ 272 ]
�
� |
Proposal for new Annex I Terminal device provisioning for X.iptvsec-4: Algorithm select scheme for SCP descrambling
�
� |
ETRI
� |
Q6/17
� |
2010-03-29 |
|
[ 271 ]
�
� |
Proposal for new Annex II secure storing SCP Client in X.iptvsec-4: Algorithm select scheme for SCP descrambling
�
� |
ETRI
� |
Q6/17
� |
2010-03-29 |
|
[ 270 ]
�
� |
Comments on generic IdM interoperability mechanism
�
� |
KDDI Corporation
� |
Q10/17
� |
2010-03-29 |
|
[ 269 ]
�
� |
X.handle; Infrastructure for Interoperability of Heterogeneous Information Systems
�
� |
Corporation for National Research Initiatives
� |
Q12/17, Q10/17
� |
2010-03-29 |
|
[ 268 ]
�
� |
Security coordination
�
� |
France
� |
QALL/17
� |
2010-03-29 |
|
[ 267 ]
�
(Rev.1)� |
A proposal on studying security requirements and framework of cloud based telecommunication service environment
�
� |
ZTE Corporation, CATR, MIIT
� |
Q8/17
� |
2010-03-26 |
|
[ 266 ]
�
� |
User authentication mechanism of X.p2p-3
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 265 ]
�
� |
Updated text of X.msec-6: Overview aspects of mobile phones
�
� |
MIIT, China
� |
Q6/17
� |
2010-03-26 |
|
[ 264 ]
�
� |
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 263 ]
�
� |
Proposed text in section 7 of X.tcs-1
�
� |
MIIT, China
� |
Q5/17
� |
2010-03-26 |
|
[ 262 ]
�
� |
A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG
�
� |
MIIT, China
� |
Q5/17
� |
2010-03-26 |
|
[ 261 ]
�
� |
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 260 ]
�
� |
Proposed draft Rec. X.ismf, Information security management framework
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 259 ]
�
� |
Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"
�
� |
MIIT, China
� |
Q6/17
� |
2010-03-26 |
|
[ 258 ]
�
� |
Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks
�
� |
MIIT, China
� |
Q5/17
� |
2010-03-26 |
|
[ 257 ]
�
� |
Organization and Personnel part in X.ismf
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
Resultats:756 documents R�sultats :�
Pr�c�dent�-�
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
�-�Suivant
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):