Contributions
�[�AI/Question:�Q5/17�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 353 ]
�
� |
Architecture of external interfaces for telecommunication network security system
�
� |
Russian Federation Telecommunication Admin.
� |
Q5/17
� |
2008-09-02 |
|
[ 344 ]
�
� |
Comments on Draft Recommendation X.gisn, Guidelines for Implementing System and Network Security
�
� |
Canada
� |
Q7/17, Q5/17
� |
2008-03-29 |
|
[ 264 ]
�
� |
Architecture of External Interrelations for Telecommunication Network Security System
�
� |
Russian Federation Telecom. Administration
� |
Q5/17
� |
2008-03-25 |
|
[ 254 ]
�
� |
Revised text for new Question on Digital Media Protection
�
� |
Korea (Republic of)
� |
Q17/17, Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17
� |
2007-11-30 |
|
[ 249 ]
�
� |
Proposed text for new Question on countering cyber attacks by technical means
�
� |
Korea (Republic of)
� |
Q17/17, Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17
� |
2007-11-30 |
|
[ 246 ]
�
� |
Final text on X.akm: Guideline on EAP-based Authentication and Key Management in a Data Communication Network
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-11-30 |
|
[ 241 ]
�
� |
Update to Guidelines for Implementing System & Network Security
�
� |
Lucent Technologies USA
� |
Q5/17
� |
2007-11-30 |
|
[ 236 ]
�
� |
Remote Access to the Network
�
� |
India
� |
Q9/17, Q7/17, Q5/17, Q4/17
� |
2007-11-30 |
|
[ 226 ]
�
� |
Identification and authentication of bearer traffic (contribution to the draft Recommendation Y.NGN Authentication)
�
� |
Lucent Technologies (USA)
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
� |
2007-09-12 |
|
[ 225 ]
�
� |
Mechanism for authenticating flow of bearer traffic in NGN (contribution to the draft Recommendation Y.NGN Security Mechanisms)
�
� |
Lucent Technologies (USA)
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
� |
2007-09-12 |
|
[ 219 ]
�
� |
Proposed idea on the structure of Security Activities for the next study period
�
� |
Japan
� |
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17
� |
2007-09-10 |
|
[ 198 ]
�
� |
Comments on draft Recommendation X.805+, COM 17 - C 86 - E
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 195 ]
�
� |
Comments on draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 194 ]
�
� |
Guidelines for Implementing System & Network Security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2007-09-10 |
|
[ 167 ]
�
� |
Proposal for revised draft Recommendation on X.akm: Framework for EAP-based Authentication and Key Management in a data communication network
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-09-09 |
|
[ 166 ]
�
� |
Revised draft of the ITU-T Recommendation X.spn
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-09-09 |
|
[ 128 ]
�
� |
Proposal for updated first draft Recommendation on X.akm: Framework for EAP-based Authentication and Key Management in an end-to-end data communication network
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-04-10 |
|
[ 127 ]
�
� |
Proposal for updated draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Korea (Republic of)
� |
Q5/17
� |
2007-04-10 |
|
[ 115 ]
�
� |
Proposed some modifications in X.akm
�
� |
ZTE Corporation
� |
Q5/17
� |
2007-04-10 |
|
[ 101 ]
�
� |
Proposal for discussion on X.pak (Password-authenticated key exchange (PAK) protocol)
�
� |
China
� |
Q5/17
� |
2006-11-27 |
|
[ 91 ]
�
� |
A comment on the draft of network security certification based on ITU-T X.805
�
� |
Japan
� |
Q7/17, Q5/17
� |
2006-11-27 |
|
[ 86 ]
�
� |
Third draft of the ITU-T Recommendation X.805+
�
� |
Russian Federation
� |
Q5/17
� |
2006-11-24 |
|
[ 85 ]
�
� |
A proposal that the work on the draft Recommendation on Network security certification based on ITU-T Recommendation X.805 be terminated
�
� |
Canada
� |
Q5/17
� |
2006-11-24 |
|
[ 84 ]
�
� |
A proposal that the draft Recommendation on network security certification based on ITU-T Recommendation X.805 not be consented
�
� |
Canada
� |
Q5/17
� |
2006-11-24 |
|
[ 64 ]
�
� |
Proposal for a figure of a PAK protocol description in X.pak
�
� |
Korea(Republic of)
� |
Q5/17
� |
2006-11-24 |
|
[ 63 ]
�
� |
Proposal for First Draft Recommendation on X.ngn-akm - Framework for EAP-based Authentication and Key Management of NGN
�
� |
Korea (Republic of)
� |
Q5/17
� |
2006-11-24 |
|
[ 62 ]
�
� |
Proposed revision of draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Korea (Republic of)
� |
Q5/17
� |
2006-11-24 |
|
[ 53 ]
�
� |
Applying ITU-T X.805 to physical security
�
� |
Lucent Technologies (USA)
� |
Q5/17
� |
2006-11-22 |
|
[ 51 ]
�
� |
Proposal to include common shared policy decision server among two different networks in draft of X.spn - Framework for creation, storage, distribution, and enforcement of policies for network security
�
� |
Reliance Communications Limited, India
� |
Q5/17
� |
2006-11-22 |
|
[ 41 ]
�
� |
Feedback on password-authenticated key exchange (PAK) protocol (COM 17- D 136)
�
� |
Nortel Networks, Canada
� |
Q5/17
� |
2006-08-17 |
|
[ 17 ]
�
� |
Report of the Joint Rapporteur's meeting on Security (Tokyo, 15-17 November 2004)
�
� |
Vice-Chairman SG 17 (Yu Watanabe)
� |
Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17
� |
2005-01-14 |
Results:31 total items.
� |
Multiple Document Download:�Formats and Languages to be included (when available):