Contribuciones�� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 260 ]
�
� |
Proposal for a corrigendum on ITU-T X Supplement 26
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2018-03-07 |
|
[ 259 ]
�
� |
Proposal for security threats to smart metering services
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2018-03-07 |
|
[ 258 ]
�
� |
Proposal for X.tfss: add new content
�
� |
China Unicom
� |
Q7/17
� |
2018-03-07 |
|
[ 257 ]
�
� |
Proposal for X.srfb: add new content
�
� |
China Unicom
� |
Q7/17
� |
2018-03-07 |
|
[ 256 ]
�
� |
Proposal for X.nb-iot: add new content
�
� |
China Unicom
� |
Q6/17
� |
2018-03-07 |
|
[ 255 ]
�
� |
Contribution to X.sup-1254rev: Use case No.2
�
� |
China Mobile Communications Corporation
,
China Unicom
� |
Q10/17
� |
2018-03-07 |
|
[ 254 ]
�
� |
Proposed Modification on BaseText of X.sdnsec-3
�
� |
China Mobile Communications Corporation
,
China Unicom
,
Nokia Shanghai Bell Co. Ltd.
� |
Q2/17
� |
2018-03-07 |
|
[ 253 ]
�
� |
Proposal of baseline text of X.itssec-5: Security guidelines for vehicular edge computing
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q13/17
� |
2018-03-07 |
|
[ 252 ]
�
� |
Proposal of baseline text for X.itssec-2 regarding use cases of the V2X communication system
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q13/17
� |
2018-03-07 |
|
[ 251 ]
�
� |
Proposal for a NWI: Security guidelines for the protection of users' personal information while countering spam
�
� |
China Mobile Communications Corporation
,
China Unicom
,
Ministry of Industry and Information Technology (MIIT)
� |
Q5/17
� |
2018-03-07 |
|
[ 250 ]
�
� |
Proposed Modification on Base Text of draft Recommendation X.voltesec-1
�
� |
China Mobile Communications Corporation
� |
Q2/17
� |
2018-03-07 |
|
[ 249 ]
�
� |
Proposal for new work item on "X.SDSec: Guideline on Software-defined Security in SDN/NFV Network"
�
� |
China Mobile Communications Corporation
,
China Unicom
,
Nokia Shanghai Bell Co. Ltd.
� |
Q2/17
� |
2018-03-07 |
|
[ 248 ]
�
� |
Proposal for the 6th revised text for ITU-T X.iotsec-2, Security framework for Internet of Things
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2018-03-07 |
|
[ 247 ]
�
� |
Proposal for a new work item: Security threats and requirements for video monitoring services
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2018-03-07 |
|
[ 246 ]
�
� |
Proposal for a new work item: Capabilities for Collection and Preservation of Network Threat Evidence
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2018-03-07 |
|
[ 245 ]
�
� |
Proposed comment on X.cins
�
� |
NEC Corporation
� |
Q3/17
� |
2018-03-07 |
|
[ 244 ]
�
� |
Proposed comments on X.1054-rev
�
� |
NEC Corporation
� |
Q3/17
� |
2018-03-07 |
|
[ 243 ]
�
� |
Proposal for 7th revised text for ITU-T X.sup-gpim, Code of practice for personally identifiable information protection for telecommunications organizations
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2018-03-07 |
|
[ 242 ]
�
� |
Proposal for new work item on "Security guidelines for 5G systems in the quantum computing era"
�
� |
China Mobile Communications Corporation
,
Nokia Shanghai Bell Co. Ltd.
� |
Q6/17, Q2/17
� |
2018-03-07 |
|
[ 241 ]
�
� |
the 4th draft of X.SRCaaS
�
� |
China Mobile Communications Corporation
� |
Q8/17
� |
2018-03-07 |
|
[ 240 ]
�
� |
the 4th draft of X.sub-grm
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2018-03-07 |
|
[ 239 ]
�
(Rev.1)� |
Proposal for a new work item: Technologies in countering website spoofing for telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2018-03-07 |
|
[ 238 ]
�
� |
Views on CG Transformation of Security Systems (in TD 895)
�
� |
United States
� |
QALL/17
� |
2018-03-07 |
|
[ 237 ]
�
� |
Proposal for new work item: Security Guidelines for Big Data
�
� |
Symantec Corporation
� |
Q8/17
� |
2018-03-06 |
|
[ 236 ]
�
� |
Proposal for including optional support for multiple public key algorithm certificates and CRLs in ITU-T X.509 | ISO/IEC 9594-8
�
� |
Canada
� |
Q11/17
� |
2018-03-06 |
|
[ 235 ]
�
� |
Proposed new text for X.gcims
�
� |
China Telecommunications Corporation
� |
Q5/17
� |
2018-03-06 |
|
[ 234 ]
�
� |
Clarification of the relationship between X.1248 and X.gcims
�
� |
China Telecommunications Corporation
� |
Q5/17
� |
2018-03-06 |
|
[ 233 ]
�
� |
Proposed revised text for chapter 8 and 9 of X.tfcma
�
� |
China Telecommunications Corporation
� |
Q5/17
� |
2018-03-06 |
|
[ 232 ]
�
� |
Proposed new text for chapter 10 of X.SRIaaS
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2018-03-06 |
|
[ 231 ]
�
� |
Revised text of X.tfcma: Technical Framework for Countering Mobile In-application Advertising Spam
�
� |
Alibaba China Co. Ltd.
,
China Telecommunications Corporation
� |
Q5/17
� |
2018-03-06 |
|
[ 230 ]
�
� |
A new work item proposal for Security Requirements of Telecommunications Networks Connected Vehicles
�
� |
360 Technology Co, Ltd.
� |
Q13/17
� |
2018-03-06 |
|
[ 229 ]
�
� |
Proposal for the 2nd revised text for X.ucstix, Use Cases for Structured Threat Information Expression (STIX)
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q4/17
� |
2018-03-06 |
|
[ 228 ]
�
� |
Proposal for the 3rd draft of X.eaasd
�
� |
Alibaba China Co. Ltd.
� |
Q9/17, Q10/17
� |
2018-03-06 |
|
[ 227 ]
�
� |
Proposal for increasing new metrics in assessing composite vulnerabilities to X.1521
�
� |
Iran (Islamic Republic of)
,
Ministry of Information & Communication Technology (MICT)
� |
Q4/17, Q2/17
� |
2018-03-06 |
|
[ 226 ]
�
� |
Security Consideration of Migration to IPv6 with Tunneling Methodsi
�
� |
Iran (Islamic Republic of)
,
Ministry of Information & Communication Technology (MICT)
� |
Q2/17
� |
2018-03-06 |
|
[ 225 ]
�
� |
Revised baseline text for ITU-T X.iotsec-2, security framework for Internet of Things
�
� |
Ministry of Information & Communication Technology (MICT)
� |
Q6/17
� |
2018-03-06 |
|
[ 224 ]
�
� |
Proposal for the 2nd draft of X.sradlt
�
� |
Alibaba China Co. Ltd.
� |
Q14/17
� |
2018-03-06 |
|
[ 223 ]
�
� |
Proposal for the 2nd draft of X.tfcas
�
� |
Alibaba China Co. Ltd.
� |
Q5/17
� |
2018-03-06 |
|
[ 222 ]
�
(Rev.1)� |
ITU-T X.orf-gs: Proposed modifications for architectures and procedures of resolution framework
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q11/17
� |
2018-03-06 |
|
[ 221 ]
�
� |
Proposed editorial revision of the draft recommendation X.GSBDaaS
�
� |
China, Ministry of Industry and Information Technology (MIIT)
� |
Q8/17
� |
2018-03-06 |
|
[ 220 ]
�
� |
Technology specification for data protection of Internet of Vehicle information service
�
� |
China, Ministry of Industry and Information Technology (MIIT)
� |
Q13/17
� |
2018-03-06 |
|
[ 219 ]
�
+Add.1� |
Proposed new draft text for Recommendation X.ibc-iot
�
� |
China Telecommunications Corporation
,
Huawei Technologies Co., Ltd.
,
Shenzhen OLYM Information Security Technology Co. Ltd.
� |
Q6/17
� |
2018-03-06 |
|
[ 218 ]
�
� |
Proposed revisions for Question 8/17 text
�
� |
China, Ministry of Industry and Information Technology (MIIT)
� |
Q8/17
� |
2018-03-06 |
|
[ 217 ]
�
� |
Proposal for the first draft of X.ssc: Security Service Chain Architecture
�
� |
China Mobile Communications Corporation
,
China Unicom
,
Ministry of Industry and Information Technology (MIIT)
,
Nokia Shanghai Bell Co. Ltd.
� |
Q2/17
� |
2018-03-06 |
|
[ 216 ]
�
� |
Proposal to augment draft X.sup-myuc with best practice recommendations on information security controls based on ISO 27002
�
� |
Symantec Corporation
� |
Q3/17
� |
2018-03-05 |
|
[ 215 ]
�
� |
Proposed assessment methodology for Distributed Ledgers Technology Threat Landscape
�
� |
Symantec Corporation
� |
QALL/17
� |
2018-03-05 |
|
[ 214 ]
�
+Add.1� |
5G VoLTE media encryption
�
� |
itk AVtobvS Sarl
� |
Q2/17
� |
2018-03-05 |
|
[ 213 ]
�
� |
Proposal for new work item: Best practice framework to build a Cyber Defence Center
�
� |
Symantec Corporation
� |
Q3/17
� |
2018-03-05 |
|
[ 212 ]
�
� |
X.te Approval
�
� |
Aetna
� |
Q10/17
� |
2018-03-02 |
|
[ 211 ]
�
� |
Revising X.1254 - Proposed direction for X.1254Rev
�
� |
Aetna
� |
Q10/17
� |
2018-02-28 |
Resultados :120 documentos Resultados :�
Anterior�-�
1 -
2 -
3
�-�Siguiente
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):