Contributions�� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 56 ]
�
� |
Proposal for the 1st draft of Recommendation X.isg: Information security governance for telecommunications organizations
�
� |
Korea
� |
Q3/17
� |
2009-02-02 |
|
[ 55 ]
�
� |
Updated draft text on Recommendation X.tb-ucc : Traceback use cases and capabilities
�
� |
Korea
� |
Q4/17
� |
2009-02-02 |
|
[ 54 ]
�
� |
Proposal for the third draft text on Recommendation X.iptvsec-3 : Key management framework for secure IPTV services
�
� |
Korea
� |
Q6/17
� |
2009-02-02 |
|
[ 53 ]
�
� |
Proposal for the first draft text of Recommendation X.1034, Amd. 1 : Guideline on extensible authentication protocol based authentication and key management in a data communication network
�
� |
Korea
� |
Q2/17
� |
2009-02-02 |
|
[ 52 ]
�
� |
Proposal for the second revised draft text of Recommendation X.usnsec-1 : Security framework for ubiquitous sensor network
�
� |
Korea
� |
Q6/17
� |
2009-02-02 |
|
[ 51 ]
�
� |
Proposal for revised draft Recommendation of X.ott : Authentication framework with one-time telebiometric template
�
� |
Korea
� |
Q9/17
� |
2009-02-02 |
|
[ 50 ]
�
� |
Check-list for Recommendation X.iptvsec-2
�
� |
Korea
� |
Q6/17
� |
2009-02-02 |
|
[ 49 ]
�
� |
Proposed text for Appendix to Recommendation X.iptvsec-2
�
� |
Korea
� |
Q6/17
� |
2009-02-02 |
|
[ 48 ]
�
� |
Relation between X.iptvsec-2 and X.iptvsec-54
�
� |
Korea
� |
Q6/17
� |
2009-02-02 |
|
[ 47 ]
�
� |
Proposal of a first draft text for X.tcs-2: Technical means for countering VoIP spam
�
� |
Korea
� |
Q5/17
� |
2009-02-02 |
|
[ 46 ]
�
� |
Modification of chapter 13 and Appendix I of draft Recommendation X.fcsip
�
� |
Korea
� |
Q5/17
� |
2009-02-02 |
|
[ 45 ]
�
� |
Text on authentication assurance for consideration in drafting Recommendation X.eaa
�
� |
United States of America
� |
Q10/17
� |
2009-02-02 |
|
[ 44 ]
�
� |
Considering approval of the CA/Browser Forum specification for extended validation certificates as an ITU-T Recommendation
�
� |
VeriSign
� |
Q4/17, Q12/17, Q11/17, Q10/17
� |
2009-02-02 |
|
[ 43 ]
�
� |
Proposed Amendment to Recommendation X.1082
�
� |
UK
� |
Q9/17
� |
2009-02-02 |
|
[ 42 ]
�
� |
Proposed Amendment to Recommendation X.1081
�
� |
UK
� |
Q9/17
� |
2009-02-02 |
|
[ 41 ]
�
� |
Comments on ITU-T draft Recommendation X.1251
�
� |
UK
� |
Q10/17
� |
2009-02-02 |
|
[ 40 ]
�
� |
Comments on draft ITU-T Recommendation X.1250
�
� |
UK
� |
Q10/17
� |
2009-02-02 |
|
[ 39 ]
�
� |
Comments on Rec. ITU-T X.1191 under TAP consultation
�
� |
France Telecom
� |
Q6/17
� |
2009-02-02 |
|
[ 38 ]
�
� |
Comments on Rec. ITU-T X.1251 under TAP consultation
�
� |
France Telecom
� |
Q10/17
� |
2009-02-02 |
|
[ 37 ]
�
� |
Comments on Rec. ITU-T X.1250 under TAP consultation
�
� |
France
� |
Q10/17
� |
2009-02-02 |
|
[ 36 ]
�
� |
Changes on the proposed new structure for SG 17
�
� |
France
� |
QALL/17
� |
2009-02-02 |
|
[ 35 ]
�
� |
Entity authentication assurance - The ecosystem and framework for Rec. X.eaa
�
� |
VeriSign
� |
Q10/17
� |
2009-01-30 |
|
[ 34 ]
�
� |
Comments on Rec. ITU-T X.1171 under TAP consultation
�
� |
France
� |
Q6/17
� |
2009-01-30 |
|
[ 33 ]
�
� |
Input to X.eaa: Mapping European IDABC Authentication Levels to SAML 2.0 - Gap analysis and recommendations
�
� |
CE (ENISA)
� |
Q10/17
� |
2009-01-30 |
|
[ 32 ]
�
(Rev.1)� |
Comments on draft Recommendation X.1191 (X.iptvsec-1) Functional requirements and architecture for IPTV security aspects
�
� |
Deutsche Telekom
� |
Q6/17
� |
2009-01-30 |
|
[ 31 ]
�
� |
Clarification proposal of scope and requirements in X.iptvsec-2.
�
� |
NTT
,
Softbank BB
� |
Q6/17
� |
2009-01-30 |
|
[ 30 ]
�
� |
Assignment of default approval procedures to Questions of SG 17
�
� |
Germany
� |
QALL/17
� |
2009-01-30 |
|
[ 29 ]
�
(Rev.1)� |
Amendment to draft Recommendation X.1251 (X.idif)
�
� |
Germany
� |
Q10/17
� |
2009-01-30 |
|
[ 28 ]
�
� |
Proposal of the new discussion item for telebiometrics - Evaluation framework for protection techniques of biometric template
�
� |
Japan
� |
Q9/17
� |
2009-01-30 |
|
[ 27 ]
�
� |
Proposal on expanding the scope of the study related to X.sap-3 (management framework for one time password (OTP) based authentication service)
�
� |
Japan
� |
Q7/17
� |
2009-01-30 |
|
[ 26 ]
�
� |
Comments related to draft Rec. X.msec-5
�
� |
France Telecom
� |
Q6/17
� |
2009-02-03 |
|
[ 25 ]
�
� |
Proposed changes to the text of Q.6 "Security aspects of ubiquitous telecommunication services"
�
� |
France Telecom
� |
Q6/17
� |
2009-02-03 |
|
[ 24 ]
�
� |
Comments on draft new Recommendation ITU-T X.1251 (X.idif - A framework for user control of digital identity) (COM 17-R 47)
�
� |
Canada
� |
Q10/17
� |
2009-02-03 |
|
[ 23 ]
�
� |
Comments on draft new Recommendation ITU-T X.1250 (X.idmreq - Capabilities for enhanced global identity management trust and interoperability) (COM 17-R 46)
�
� |
Canada
� |
Q10/17
� |
2009-02-03 |
|
[ 22 ]
�
� |
Recommendation that SG 17 continue the Joint Coordination Activity on Conformance and Interoperability Testing (JCA-CIT)
�
� |
Canada
� |
QALL/17
� |
2009-02-03 |
|
[ 21 ]
�
� |
Comments on draft new Recommendation ITU-T X.1191 (X.iptvsec-1 - Functional requirements and architecture for IPTV security aspects) (COM 17-R 44)
�
� |
Canada
� |
Q6/17
� |
2009-02-03 |
|
[ 20 ]
�
(Rev.1)� |
Proposal for the first draft text of X.msec-5 : Security aspects of mobile multi-homed communications
�
� |
ETRI
� |
Q6/17
� |
2009-01-30 |
|
[ 19 ]
�
� |
First draft proposal for X.sap-3: Guidelines for the management framework of OTP-based authentication services
�
� |
ETRI
� |
Q7/17
� |
2009-01-30 |
|
[ 18 ]
�
� |
Suggestion of adding new subsection items and modifications to existing subsections for the section 7 "interoperable SCP framework" appeared on the draft text of X.iptvsec-5
�
� |
ETRI
� |
Q7/17, Q6/17
� |
2009-01-30 |
|
[ 17 ]
�
� |
Scenarios of SCP-B or SCP-IX deployed in IPTV Terminal Device
�
� |
ETRI
� |
Q7/17, Q6/17
� |
2009-01-30 |
|
[ 16 ]
�
� |
Proposed draft Rec.X.p2p-3, Security guideline of P2P-based telecommunication network
�
� |
China Mobile
,
MII China
,
ZTE
� |
Q7/17
� |
2009-01-29 |
|
[ 15 ]
�
� |
Proposed draft Rec.X.abnot, Abnormal traffic detection and control guideline for telecommunication network
�
� |
China Mobile
,
Huawei
,
ZTE
� |
Q4/17
� |
2009-01-29 |
|
[ 14 ]
�
(Rev.1)� |
Proposal for procedure of abnormal traffic detection and control system
�
� |
ZTE
,
China Mobile
� |
Q4/17
� |
2009-01-29 |
|
[ 13 ]
�
(Rev.1)� |
Proposal for framework of abnormal traffic detection and control system
�
� |
ZTE
,
China Mobile
� |
Q4/17
� |
2009-01-29 |
|
[ 12 ]
�
� |
Proposal on general policy profile for network security
�
� |
ZTE
,
China Mobile
� |
Q4/17
� |
2009-01-29 |
|
[ 11 ]
�
� |
An overview of algorithms used in anomaly detection
�
� |
Huawei
� |
Q4/17
� |
2009-02-02 |
|
[ 10 ]
�
� |
Countering spam technologies
�
� |
Huawei Technologies
� |
Q5/17
� |
2009-01-28 |
|
[ 9 ]
�
� |
Input for draft X.eaa
�
� |
Telcordia Technologies
� |
Q10/17
� |
2009-01-28 |
|
[ 8 ]
�
� |
Input for draft X.eaa - Identity Proofing
�
� |
Telcordia Technologies
� |
Q10/17
� |
2009-01-28 |
|
[ 7 ]
�
� |
Comments on draft Rec. ITU-T X.rfpg
�
� |
France Telecom
� |
Q10/17
� |
2009-01-28 |
Resultats:756 documents R�sultats :�
Pr�c�dent�-�
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
�-�Suivant
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):