Contributions
�[�Source:�China Mobile�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 691 ]
�
� |
Proposed Edits to clause 9&10 in X.ccsec
�
� |
China
,
China Mobile Communications Corporation
� |
Q8/17
� |
2012-08-15 |
|
[ 690 ]
�
� |
X.abnot: Abnormal traffic detection and control guideline for telecommunication network
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
,
ZTE Corporation
� |
Q4/17
� |
2012-08-15 |
|
[ 689 ]
�
� |
1st Draft: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-08-15 |
|
[ 688 ]
�
� |
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2012-08-15 |
|
[ 687 ]
�
� |
Authentication integration solution for IMS scenario in X.authi - part 2.
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2012-08-15 |
|
[ 686 ]
�
� |
Authentication integration solution for IMS scenario in X.authi - part 1.
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-08-15 |
|
[ 685 ]
�
� |
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q3/17
� |
2012-08-15 |
|
[ 589 ]
�
� |
Security Protection of Customer Information in Telecom Operators
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q3/17
� |
2012-02-07 |
|
[ 588 ]
�
� |
Authentication result transfer based on encrypted cookie for WLAN scenario
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 587 ]
�
� |
Interface of the abnormal traffic detection and control system
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
� |
Q4/17
� |
2012-02-07 |
|
[ 586 ]
�
� |
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 585 ]
�
� |
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 584 ]
�
� |
A Draft of Technology Involved in Countering Voice Spam-X.ticvs
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2012-02-07 |
|
[ 583 ]
�
� |
Authentication integration solution for WLAN scenario in X.authi.
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 515 ]
�
� |
Authentication integration based on authentication gateway in X.authi
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2011-08-10 |
|
[ 514 ]
�
� |
Authentication integration based on network authentication result transfer in X.authi
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2011-08-10 |
|
[ 513 ]
�
� |
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2011-08-10 |
|
[ 512 ]
�
� |
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17, Q4/17
� |
2011-08-10 |
|
[ 511 ]
�
� |
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
�
� |
China Mobile Communications Corporation
� |
Q4/17
� |
2011-08-10 |
|
[ 510 ]
�
� |
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2011-08-10 |
|
[ 509 ]
�
� |
Performance and Interface of the abnormal traffic detection and control system
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
� |
Q4/17
� |
2011-08-10 |
|
[ 508 ]
�
� |
Proposed draft Recommendation for X.authi: Authentication integration in IDM
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2011-08-10 |
|
[ 507 ]
�
� |
VoIP security mechanism of X.p2p-3
�
� |
China
,
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q7/17
� |
2011-08-10 |
|
[ 410 ]
�
(Rev.1)� |
Propose a chapter on virtualization security for X.srfctse
�
� |
ZTE Corporation, China Mobile
� |
Q8/17
� |
2011-03-29 |
|
[ 328 ]
�
� |
Propose an authentication method involving Authentication Router for X.srfctse
�
� |
ZTE Corporation, China Mobile
� |
Q8/17
� |
2010-11-25 |
|
[ 327 ]
�
� |
Propose a federation gateway for X.srfctse
�
� |
ZTE Corporation, China Mobile
� |
Q8/17
� |
2010-11-25 |
|
[ 326 ]
�
(Rev.1)� |
Proposal for updating "Procedure of security policy distribution" section in X.gpn
�
� |
ZTE, China Mobile
� |
Q4/17
� |
2010-11-25 |
|
[ 325 ]
�
� |
Proposal for new work item on security requirements and framework of ubiquitous networking
�
� |
ZTE, China Unicom, China Mobile
� |
Q6/17
� |
2010-11-25 |
|
[ 302 ]
�
� |
Trust management evaluation criteria of X.p2p-3
�
� |
China Mobile
� |
Q7/17
� |
2010-11-25 |
|
[ 301 ]
�
� |
Trust management assumption of X.p2p-3
�
� |
China Mobile
� |
Q7/17
� |
2010-11-25 |
|
[ 300 ]
�
� |
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile
� |
Q7/17
� |
2010-11-25 |
|
[ 266 ]
�
� |
User authentication mechanism of X.p2p-3
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 264 ]
�
� |
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 261 ]
�
� |
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 260 ]
�
� |
Proposed draft Rec. X.ismf, Information security management framework
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 257 ]
�
� |
Organization and Personnel part in X.ismf
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 254 ]
�
� |
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2010-03-26 |
|
[ 252 ]
�
� |
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2010-03-26 |
|
[ 251 ]
�
� |
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
ZTE, China Mobile
� |
Q4/17
� |
2010-03-26 |
|
[ 243 ]
�
� |
Assets Management in X.ismf
�
� |
China Mobile
� |
Q3/17
� |
2010-03-26 |
|
[ 242 ]
�
� |
An analysis of X.authi: Authentication integration between the network and service layers
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 241 ]
�
� |
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
�
� |
China Mobile, Huawei
� |
Q4/17
� |
2010-03-26 |
|
[ 180 ]
�
+Corr.1� |
Proposed text for section 6 of X.idmgen
�
� |
China Mobile, ZTE Corporation
� |
Q10/17
� |
2009-09-07 |
|
[ 179 ]
�
+Corr.1� |
Proposed text for authentication assurance interoperation in X.idm-ifa
�
� |
China Mobile, ZTE Corporation
� |
Q10/17
� |
2009-09-07 |
|
[ 178 ]
�
� |
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 177 ]
�
� |
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 176 ]
�
� |
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 175 ]
�
� |
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2009-09-07 |
|
[ 174 ]
�
+Corr.1� |
Proposed text for trust establishment in X.idm-ifa
�
� |
China Mobile, ZTE Corporation
� |
Q10/17
� |
2009-09-07 |
|
[ 105 ]
�
� |
Basic concept for authentication mechanism of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2009-09-03 |
Results:60 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):