International Telecommunication Union ITU
Fran�aisEspa�ol
Site map Contact Us Print version
Home : ITU-T : SG 17 : Contributions� Recently posted�-� Search Meeting Documents
ITU-T�SG 17� C�

ITU-T�SG 17

Security

Study Period 2009

Results:60 total items.
Result page:� 1 - 2 �-�Next Next
Contributions �[�Source:�China Mobile�]���Documents / Contributions

Number
Title Source AI/Question
Date
[ 691 ]
Proposed Edits to clause 9&10 in X.ccsec � China , China Mobile Communications Corporation Q8/17 2012-08-15
[ 690 ]
X.abnot: Abnormal traffic detection and control guideline for telecommunication network � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation Q4/17 2012-08-15
[ 689 ]
1st Draft: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2012-08-15
[ 688 ]
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2012-08-15
[ 687 ]
Authentication integration solution for IMS scenario in X.authi - part 2. � China Mobile Communications Corporation Q10/17 2012-08-15
[ 686 ]
Authentication integration solution for IMS scenario in X.authi - part 1. � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-08-15
[ 685 ]
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection � China Mobile Communications Corporation , ZTE Corporation Q3/17 2012-08-15
[ 589 ]
Security Protection of Customer Information in Telecom Operators � China Mobile Communications Corporation , ZTE Corporation Q3/17 2012-02-07
[ 588 ]
Authentication result transfer based on encrypted cookie for WLAN scenario � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-02-07
[ 587 ]
Interface of the abnormal traffic detection and control system � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. Q4/17 2012-02-07
[ 586 ]
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks � China Mobile Communications Corporation Q6/17 2012-02-07
[ 585 ]
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks" � China Mobile Communications Corporation Q6/17 2012-02-07
[ 584 ]
A Draft of Technology Involved in Countering Voice Spam-X.ticvs � China Mobile Communications Corporation Q5/17 2012-02-07
[ 583 ]
Authentication integration solution for WLAN scenario in X.authi. � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-02-07
[ 515 ]
Authentication integration based on authentication gateway in X.authi � China Mobile Communications Corporation , ZTE Corporation Q10/17 2011-08-10
[ 514 ]
Authentication integration based on network authentication result transfer in X.authi � China Mobile Communications Corporation , ZTE Corporation Q10/17 2011-08-10
[ 513 ]
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization � China Mobile Communications Corporation Q3/17 2011-08-10
[ 512 ]
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations � China Mobile Communications Corporation Q5/17, Q4/17 2011-08-10
[ 511 ]
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks � China Mobile Communications Corporation Q4/17 2011-08-10
[ 510 ]
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection � China Mobile Communications Corporation Q5/17 2011-08-10
[ 509 ]
Performance and Interface of the abnormal traffic detection and control system � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. Q4/17 2011-08-10
[ 508 ]
Proposed draft Recommendation for X.authi: Authentication integration in IDM � China Mobile Communications Corporation , ZTE Corporation Q10/17 2011-08-10
[ 507 ]
VoIP security mechanism of X.p2p-3 � China , China Mobile Communications Corporation , ZTE Corporation Q7/17 2011-08-10
[ 410 ]
(Rev.1)
Propose a chapter on virtualization security for X.srfctse � ZTE Corporation, China Mobile Q8/17 2011-03-29
[ 328 ]
Propose an authentication method involving Authentication Router for X.srfctse � ZTE Corporation, China Mobile Q8/17 2010-11-25
[ 327 ]
Propose a federation gateway for X.srfctse � ZTE Corporation, China Mobile Q8/17 2010-11-25
[ 326 ]
(Rev.1)
Proposal for updating "Procedure of security policy distribution" section in X.gpn � ZTE, China Mobile Q4/17 2010-11-25
[ 325 ]
Proposal for new work item on security requirements and framework of ubiquitous networking � ZTE, China Unicom, China Mobile Q6/17 2010-11-25
[ 302 ]
Trust management evaluation criteria of X.p2p-3 � China Mobile Q7/17 2010-11-25
[ 301 ]
Trust management assumption of X.p2p-3 � China Mobile Q7/17 2010-11-25
[ 300 ]
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network � China Mobile Q7/17 2010-11-25
[ 266 ]
User authentication mechanism of X.p2p-3 � China Mobile, China MII, ZTE Q7/17 2010-03-26
[ 264 ]
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network � China Mobile, China MII, ZTE Q7/17 2010-03-26
[ 261 ]
Proposed draft Recommendation for X.authi: Authentication Integration in IDM � China Mobile, China MII, ZTE Q10/17 2010-03-26
[ 260 ]
Proposed draft Rec. X.ismf, Information security management framework � China Mobile Q3/17 2010-03-26
[ 257 ]
Organization and Personnel part in X.ismf � China Mobile Q3/17 2010-03-26
[ 254 ]
Comparing analysis of abnormal traffic system deployment solutions in X.abnot � China Mobile, Huawei Q4/17 2010-03-26
[ 252 ]
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2010-03-26
[ 251 ]
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � ZTE, China Mobile Q4/17 2010-03-26
[ 243 ]
Assets Management in X.ismf � China Mobile Q3/17 2010-03-26
[ 242 ]
An analysis of X.authi: Authentication integration between the network and service layers � China Mobile, China MII, ZTE Q10/17 2010-03-26
[ 241 ]
A solution to solve the repeated clean problem in the abnormal traffic control system deployment � China Mobile, Huawei Q4/17 2010-03-26
[ 180 ]
+Corr.1
Proposed text for section 6 of X.idmgen � China Mobile, ZTE Corporation Q10/17 2009-09-07
[ 179 ]
+Corr.1
Proposed text for authentication assurance interoperation in X.idm-ifa � China Mobile, ZTE Corporation Q10/17 2009-09-07
[ 178 ]
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 177 ]
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 176 ]
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 175 ]
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 174 ]
+Corr.1
Proposed text for trust establishment in X.idm-ifa � China Mobile, ZTE Corporation Q10/17 2009-09-07
[ 105 ]
Basic concept for authentication mechanism of P2P-based telecommunication network � China Mobile, China MII, ZTE Q7/17 2009-09-03
Results:60 total items.
Result page:� 1 - 2 �-�Next Next
Multiple Document Download:�Check the boxes of the selected documents, then click "Zip and download"

User preferences:
Multiple Document Download:�Formats and Languages to be included (when available):
HTML Navigation Pages
Formats �+�Other formats
Languages (maximum 2) �+�Multilingual�
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

Test ITU Translate for automated document translation
Top�-� Feedback�-� Contact Us�-� Copyright � ITU�2008�All Rights Reserved
Contact for this page :� TSB EDH
Updated :�2025-1-11