Contributions
�[�Source:�China�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 752 ]
�
(Rev.1)� |
Proposed revised text for X.gssiso
�
� |
China
,
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 717 ]
�
� |
Contribution for X.abnot(Inline Control Latency Problem)
�
� |
China Unicom
� |
Q4/17
� |
2012-08-16 |
|
[ 716 ]
�
� |
Contribution for X.gsiiso (Security Objectives)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 715 ]
�
� |
Contribution for X.gsiiso(Security Requirements)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 713 ]
�
� |
Draft text of Recommendation ITU-T X.ccsec: High-level Security Framework for Cloud Computing
�
� |
China
,
China Telecommunications Corporation
,
Microsoft Corporation
,
ZTE Corporation
� |
Q8/17
� |
2012-08-16 |
|
[ 712 ]
�
� |
Contribution for X.gsiiso (Functional Parts and Service Procedures)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 711 ]
�
� |
Contribution for X.gsiiso(Relationship between User, Pipe and Content)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 703 ]
�
(Rev.1)� |
Proposed text for chapter 8 of X.goscc
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-08-16 |
|
[ 691 ]
�
� |
Proposed Edits to clause 9&10 in X.ccsec
�
� |
China
,
China Mobile Communications Corporation
� |
Q8/17
� |
2012-08-15 |
|
[ 690 ]
�
� |
X.abnot: Abnormal traffic detection and control guideline for telecommunication network
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
,
ZTE Corporation
� |
Q4/17
� |
2012-08-15 |
|
[ 689 ]
�
� |
1st Draft: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-08-15 |
|
[ 688 ]
�
� |
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2012-08-15 |
|
[ 687 ]
�
� |
Authentication integration solution for IMS scenario in X.authi - part 2.
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2012-08-15 |
|
[ 686 ]
�
� |
Authentication integration solution for IMS scenario in X.authi - part 1.
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-08-15 |
|
[ 685 ]
�
� |
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q3/17
� |
2012-08-15 |
|
[ 675 ]
�
(Rev.1)� |
Proposed text for X.ccsec describing workflow.
�
� |
China
,
Microsoft Corporation
,
ZTE Corporation
� |
Q8/17
� |
2012-08-14 |
Results:16 total items.
� |
Multiple Document Download:�Formats and Languages to be included (when available):