Contributions
�[�Source:�China�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 277 ]
�
� |
New Work Item Proposal on security challenge analysis for cloud computing
�
� |
CATR, MIIT, China
� |
Q8/17
� |
2010-03-29 |
|
[ 266 ]
�
� |
User authentication mechanism of X.p2p-3
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 265 ]
�
� |
Updated text of X.msec-6: Overview aspects of mobile phones
�
� |
MIIT, China
� |
Q6/17
� |
2010-03-26 |
|
[ 264 ]
�
� |
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 263 ]
�
� |
Proposed text in section 7 of X.tcs-1
�
� |
MIIT, China
� |
Q5/17
� |
2010-03-26 |
|
[ 262 ]
�
� |
A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG
�
� |
MIIT, China
� |
Q5/17
� |
2010-03-26 |
|
[ 261 ]
�
� |
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 260 ]
�
� |
Proposed draft Rec. X.ismf, Information security management framework
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 259 ]
�
� |
Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"
�
� |
MIIT, China
� |
Q6/17
� |
2010-03-26 |
|
[ 258 ]
�
� |
Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks
�
� |
MIIT, China
� |
Q5/17
� |
2010-03-26 |
|
[ 257 ]
�
� |
Organization and Personnel part in X.ismf
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 255 ]
�
(Rev.1)� |
Proposed Application Scenarios to X.giim
�
� |
MIIT, China
� |
Q10/17
� |
2010-03-26 |
|
[ 254 ]
�
� |
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2010-03-26 |
|
[ 253 ]
�
� |
Clarify Some Issues on IdM in the Cloud Computing
�
� |
MIIT, China
� |
Q10/17
� |
2010-03-26 |
|
[ 252 ]
�
� |
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2010-03-26 |
|
[ 251 ]
�
� |
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
ZTE, China Mobile
� |
Q4/17
� |
2010-03-26 |
|
[ 248 ]
�
(Rev.1)� |
Proposal for a new work item on Requirements and Framework of secure dynamic virtual network
�
� |
Huawei Technologies Co.,Ltd.
,
China Telecom
� |
Q6/17
� |
2010-03-26 |
|
[ 243 ]
�
� |
Assets Management in X.ismf
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 242 ]
�
� |
An analysis of X.authi: Authentication integration between the network and service layers
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 241 ]
�
� |
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2010-03-26 |
Results:20 total items.
� |
Multiple Document Download:�Formats and Languages to be included (when available):