International Telecommunication Union ITU
Fran�aisEspa�ol
Site map Contact Us Print version
Home : ITU-T : SG 17 : Contributions� Recently posted�-� Search Meeting Documents
ITU-T�SG 17� C�

ITU-T�SG 17

Security

Study Period 2013

Results:65 total items.
Result page:� 1 - 2 �-�Next Next
Contributions �[�AI/Question:�Q7/17�]���Documents / Contributions

Number
Title Source AI/Question
Date
[ 607 ]
Proposal for X.websec-6: content revise for improvement � China Unicom , Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-08-16
[ 606 ]
Proposal for a new work item: Security Requirements and Framework for Big Data Analysis in Mobile Internet Services � China Unicom , Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-08-16
[ 578 ]
NWIP: "Guidelines on hybrid authentication and key management mechanisms in the client-server model" � Korea (Rep. of) Q7/17 2016-08-16
[ 577 ]
A new work item proposal for framework of de-identification processing service � Korea (Rep. of) Q7/17 2016-08-16
[ 561 ]
(Rev.1)
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators) � China Mobile Communications Corporation Q7/17 2016-08-15
[ 559 ]
A proposed text for clause 8 and related appendix for draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-08-12
[ 549 ]
Proposal to Merge Draft Question F/17 and G/17 � United States Q7/17, Q6/17, PLEN/17 2016-03-01
[ 536 ]
Minimum requirements for the implementation of information security insurance � Iran (Islamic Republic of) , Ministry of Information & CommunicationTechnology Q7/17, Q4/17 2016-02-29
[ 535 ]
A proposed method for the protection of controlling program in the reference monitor � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-02-29
[ 531 ]
A proposed metadata architecture for video analysis services � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-02-29
[ 530 ]
(Rev.1)
A proposed 3rd baseline text of draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor � China Unicom , Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-02-29
[ 504 ]
NWIP: "Guidelines on hybrid authentication and key management mechanisms with unbalanced computational capability" � Korea (Rep. of) Q7/17 2016-02-29
[ 503 ]
A proposal for additional description on circle-of-trust (CoT) � Korea (Rep. of) Q10/17, (Q7/17) 2016-02-29
[ 502 ]
(Rev.1-2)
Propose new text of X.websec-6 � China Unicom , Electronics and Telecommunications Research Institute (ETRI) Q7/17 2016-02-28
[ 496 ]
(Rev.1-2)
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators) � China Mobile Communications Corporation Q7/17 2016-02-27
[ 468 ]
Requirements on big data and digital identity � C�te d'Ivoire , Sudan Q7/17, Q10/17 2016-01-26
[ 464 ]
A proposal for the seventh draft Recommendation of ITU-T X.sap-5: Guidelines on local linkable anonymous authentication for electronic services � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2015-08-26
[ 454 ]
Propose new text of X.websec-6: Security framework and requirements for open capabilities of telecommunication services � China Unicom Q7/17 2015-08-26
[ 426 ]
A proposal for clauses 7 of draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2015-08-25
[ 415 ]
Text for Recommendation ITU-T X.1157 (X.sap-7) (for approval) � Korea (Rep. of) Q7/17 2015-08-25
[ 414 ]
Proposal for the 2nd revised text for draft Recommendation X.websec-7: A reference monitor for online analytics services � Korea (Rep. of) Q7/17 2015-08-25
[ 399 ]
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators � China Mobile Communications Corporation , Electronics and Telecommunications Research Institute (ETRI) , ZTE Corporation Q7/17 2015-08-24
[ 370 ]
A proposed text of draft Recommendation ITU-T X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2015-03-26
[ 352 ]
(Rev.1)
Proposal for X.websec-6: add contents of clause 7 � China Unicom Q7/17 2015-03-25
[ 351 ]
(Rev.1)
Proposal for X.websec-6: add contents of clause 6 � China Unicom Q7/17 2015-03-25
[ 350 ]
(Rev.1)
Propose skeleton for X.websec-6 � China Unicom Q7/17 2015-03-25
[ 349 ]
(Rev.1)
Proposal for a new work item: Security Requirements Framework and Framework Requirements for Big Data Analysis in Mobile Internet Services � China Unicom , Electronics and Telecommunications Research Institute (ETRI) Q7/17 2015-03-25
[ 343 ]
A Proposed text of clause 8.2 ITU-T X.p2p-3: security requirements and mechanisms of P2P-based telecommunication network � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2015-03-24
[ 333 ]
A Proposed baseline text of ITU-T X.websec-7: A reference monitor for online analytics services � Korea (Rep. of) Q7/17 2015-03-20
[ 327 ]
A proposal for 1st text of draft Recommendation ITU-T X.eaaa, Enhanced entity authentication based on aggregated attributes � Korea (Rep. of) Q7/17, Q10/17 2015-03-20
[ 304 ]
A proposal for the sixth draft Recommendation of ITU-T X.sap-5 � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2014-09-04
[ 303 ]
(Rev.1-2)
New work item for enhanced user authentication based on user-centric attribute aggregation � Electronics and Telecommunications Research Institute (ETRI) Q7/17, Q10/17 2014-09-04
[ 285 ]
(Rev.1)
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network � China Mobile Communications Corporation Q7/17 2014-09-03
[ 276 ]
Proposal for a new work item: Security Framework and Requirements for Telecom Service Capability Open � China Unicom Q7/17 2014-09-03
[ 258 ]
A proposal for the final text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements � Korea (Rep. of) Q7/17 2014-09-02
[ 253 ]
A new work item proposal for reference monitor for online analytics applications � Korea (Rep. of) Q7/17 2014-09-02
[ 252 ]
A proposal for clause 6, 7 and 8 in the 5th draft text for Recommendation ITU-T X.sap-8: Multi-factor authentication mechanisms based on a mobile device � Korea (Rep. of) Q7/17 2014-09-02
[ 251 ]
Proposal of the 5th draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813 � Korea (Rep. of) Q7/17 2014-09-02
[ 246 ]
The 5th revised text of X.sap-8: Multi-factor authentication mechanisms based on a mobile device � Korea (Rep. of) Q7/17 2014-09-02
[ 221 ]
Comparison of new work item and X.atag � Electronics and Telecommunications Research Institute (ETRI) Q7/17, Q10/17 2014-01-02
[ 213 ]
(Rev.1)
Proposal of the 3rd draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813 � Korea (Rep. of) Q7/17 2014-01-02
[ 208 ]
(Rev.1-2)
Proposal for supplement to X.1144 - Enhancements and new features in XACML 3.0 � Korea (Rep. of) Q7/17, Q10/17 2014-01-02
[ 206 ]
(Rev.1)
A proposal for the 3rd revised text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices � Korea (Rep. of) Q7/17 2014-01-02
[ 202 ]
(Rev.1)
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices � Korea (Rep. of) Q7/17 2014-01-02
[ 200 ]
(Rev.1)
Final text of draft Recommendation ITU-T X.websec-5: Security framework for web mashup services (for agreement) � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2014-01-01
[ 177 ]
(Rev.1-3)
A proposal of new work item : reference monitor for online analytics applications � Electronics and Telecommunications Research Institute (ETRI) Q7/17 2013-12-31
[ 171 ]
A proposal of new work item: Supplement on cryptographic protocols and its verification � KDDI Corporation Q7/17, Q1/17 2013-12-30
[ 150 ]
(Rev.1)
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices � Korea (Rep. of) Q7/17 2013-08-14
[ 145 ]
(Rev.1)
A proposal for the 4th revised text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements � Korea (Rep. of) Q7/17 2013-08-14
[ 143 ]
(Rev.1)
A proposal for X.sap-7's Annex I: Monitoring information for the detection of fraud activities � Korea (Rep. of) Q7/17 2013-08-14
Results:65 total items.
Result page:� 1 - 2 �-�Next Next
Multiple Document Download:�Check the boxes of the selected documents, then click "Zip and download"

User preferences:
Multiple Document Download:�Formats and Languages to be included (when available):
HTML Navigation Pages
Formats �+�Other formats
Languages (maximum 2) �+�Multilingual�
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

Test ITU Translate for automated document translation
Top�-� Feedback�-� Contact Us�-� Copyright � ITU�2008�All Rights Reserved
Contact for this page :� TSB EDH
Updated :�2025-1-24