Contributions
�[�AI/Question:�Q7/17�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 607 ]
�
� |
Proposal for X.websec-6: content revise for improvement
�
� |
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-08-16 |
|
[ 606 ]
�
� |
Proposal for a new work item: Security Requirements and Framework for Big Data Analysis in Mobile Internet Services
�
� |
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-08-16 |
|
[ 578 ]
�
� |
NWIP: "Guidelines on hybrid authentication and key management mechanisms in the client-server model"
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2016-08-16 |
|
[ 577 ]
�
� |
A new work item proposal for framework of de-identification processing service
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2016-08-16 |
|
[ 561 ]
�
(Rev.1)� |
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators)
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2016-08-15 |
|
[ 559 ]
�
� |
A proposed text for clause 8 and related appendix for draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-08-12 |
|
[ 549 ]
�
� |
Proposal to Merge Draft Question F/17 and G/17
�
� |
United States
� |
Q7/17, Q6/17, PLEN/17
� |
2016-03-01 |
|
[ 536 ]
�
� |
Minimum requirements for the implementation of information security insurance
�
� |
Iran (Islamic Republic of)
,
Ministry of Information & CommunicationTechnology
� |
Q7/17, Q4/17
� |
2016-02-29 |
|
[ 535 ]
�
� |
A proposed method for the protection of controlling program in the reference monitor
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-02-29 |
|
[ 531 ]
�
� |
A proposed metadata architecture for video analysis services
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-02-29 |
|
[ 530 ]
�
(Rev.1)� |
A proposed 3rd baseline text of draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor
�
� |
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-02-29 |
|
[ 504 ]
�
� |
NWIP: "Guidelines on hybrid authentication and key management mechanisms with unbalanced computational capability"
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2016-02-29 |
|
[ 503 ]
�
� |
A proposal for additional description on circle-of-trust (CoT)
�
� |
Korea (Rep. of)
� |
Q10/17, (Q7/17)
� |
2016-02-29 |
|
[ 502 ]
�
(Rev.1-2)� |
Propose new text of X.websec-6
�
� |
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2016-02-28 |
|
[ 496 ]
�
(Rev.1-2)� |
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators)
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2016-02-27 |
|
[ 468 ]
�
� |
Requirements on big data and digital identity
�
� |
C�te d'Ivoire
,
Sudan
� |
Q7/17, Q10/17
� |
2016-01-26 |
|
[ 464 ]
�
� |
A proposal for the seventh draft Recommendation of ITU-T X.sap-5: Guidelines on local linkable anonymous authentication for electronic services
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2015-08-26 |
|
[ 454 ]
�
� |
Propose new text of X.websec-6: Security framework and requirements for open capabilities of telecommunication services
�
� |
China Unicom
� |
Q7/17
� |
2015-08-26 |
|
[ 426 ]
�
� |
A proposal for clauses 7 of draft Recommendation ITU-T X.websec-7, Security requirements for reference monitor
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2015-08-25 |
|
[ 415 ]
�
� |
Text for Recommendation ITU-T X.1157 (X.sap-7) (for approval)
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2015-08-25 |
|
[ 414 ]
�
� |
Proposal for the 2nd revised text for draft Recommendation X.websec-7: A reference monitor for online analytics services
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2015-08-25 |
|
[ 399 ]
�
� |
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators
�
� |
China Mobile Communications Corporation
,
Electronics and Telecommunications Research Institute (ETRI)
,
ZTE Corporation
� |
Q7/17
� |
2015-08-24 |
|
[ 370 ]
�
� |
A proposed text of draft Recommendation ITU-T X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2015-03-26 |
|
[ 352 ]
�
(Rev.1)� |
Proposal for X.websec-6: add contents of clause 7
�
� |
China Unicom
� |
Q7/17
� |
2015-03-25 |
|
[ 351 ]
�
(Rev.1)� |
Proposal for X.websec-6: add contents of clause 6
�
� |
China Unicom
� |
Q7/17
� |
2015-03-25 |
|
[ 350 ]
�
(Rev.1)� |
Propose skeleton for X.websec-6
�
� |
China Unicom
� |
Q7/17
� |
2015-03-25 |
|
[ 349 ]
�
(Rev.1)� |
Proposal for a new work item: Security Requirements Framework and Framework Requirements for Big Data Analysis in Mobile Internet Services
�
� |
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2015-03-25 |
|
[ 343 ]
�
� |
A Proposed text of clause 8.2 ITU-T X.p2p-3: security requirements and mechanisms of P2P-based telecommunication network
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2015-03-24 |
|
[ 333 ]
�
� |
A Proposed baseline text of ITU-T X.websec-7: A reference monitor for online analytics services
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2015-03-20 |
|
[ 327 ]
�
� |
A proposal for 1st text of draft Recommendation ITU-T X.eaaa, Enhanced entity authentication based on aggregated attributes
�
� |
Korea (Rep. of)
� |
Q7/17, Q10/17
� |
2015-03-20 |
|
[ 304 ]
�
� |
A proposal for the sixth draft Recommendation of ITU-T X.sap-5
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2014-09-04 |
|
[ 303 ]
�
(Rev.1-2)� |
New work item for enhanced user authentication based on user-centric attribute aggregation
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17, Q10/17
� |
2014-09-04 |
|
[ 285 ]
�
(Rev.1)� |
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2014-09-03 |
|
[ 276 ]
�
� |
Proposal for a new work item: Security Framework and Requirements for Telecom Service Capability Open
�
� |
China Unicom
� |
Q7/17
� |
2014-09-03 |
|
[ 258 ]
�
� |
A proposal for the final text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-09-02 |
|
[ 253 ]
�
� |
A new work item proposal for reference monitor for online analytics applications
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-09-02 |
|
[ 252 ]
�
� |
A proposal for clause 6, 7 and 8 in the 5th draft text for Recommendation ITU-T X.sap-8: Multi-factor authentication mechanisms based on a mobile device
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-09-02 |
|
[ 251 ]
�
� |
Proposal of the 5th draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-09-02 |
|
[ 246 ]
�
� |
The 5th revised text of X.sap-8: Multi-factor authentication mechanisms based on a mobile device
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-09-02 |
|
[ 221 ]
�
� |
Comparison of new work item and X.atag
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17, Q10/17
� |
2014-01-02 |
|
[ 213 ]
�
(Rev.1)� |
Proposal of the 3rd draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-01-02 |
|
[ 208 ]
�
(Rev.1-2)� |
Proposal for supplement to X.1144 - Enhancements and new features in XACML 3.0
�
� |
Korea (Rep. of)
� |
Q7/17, Q10/17
� |
2014-01-02 |
|
[ 206 ]
�
(Rev.1)� |
A proposal for the 3rd revised text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-01-02 |
|
[ 202 ]
�
(Rev.1)� |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-01-02 |
|
[ 200 ]
�
(Rev.1)� |
Final text of draft Recommendation ITU-T X.websec-5: Security framework for web mashup services (for agreement)
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2014-01-01 |
|
[ 177 ]
�
(Rev.1-3)� |
A proposal of new work item : reference monitor for online analytics applications
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2013-12-31 |
|
[ 171 ]
�
� |
A proposal of new work item: Supplement on cryptographic protocols and its verification
�
� |
KDDI Corporation
� |
Q7/17, Q1/17
� |
2013-12-30 |
|
[ 150 ]
�
(Rev.1)� |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2013-08-14 |
|
[ 145 ]
�
(Rev.1)� |
A proposal for the 4th revised text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2013-08-14 |
|
[ 143 ]
�
(Rev.1)� |
A proposal for X.sap-7's Annex I: Monitoring information for the detection of fraud activities
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2013-08-14 |
Results:65 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):