Contributions
�[�Source:�China Mobile Communications Corporation�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 446 ]
�
� |
2nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2015-08-26 |
|
[ 425 ]
�
(Rev.1)� |
Security reference architecture for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 424 ]
�
� |
Security threats and security requirements for SDN Resource-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 423 ]
�
� |
Security threats and security requirements for SDN Application-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking.
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 422 ]
�
� |
Security threats and security requirements for SDN Resource Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 421 ]
�
� |
Security threats and security requirements for SDN Control Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 399 ]
�
� |
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators
�
� |
China Mobile Communications Corporation
,
Electronics and Telecommunications Research Institute (ETRI)
,
ZTE Corporation
� |
Q7/17
� |
2015-08-24 |
Results:7 total items.
� |
Multiple Document Download:�Formats and Languages to be included (when available):