Contributions
�[�Source:�China Mobile Communications Corporation�]��� |
�
|
Number�
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 605 ]
�
� |
Proposal for a new work item: Technical Framework for Countering Telephone Fraud
�
� |
China
,
China Mobile Communications Corporation
,
China Unicom
� |
Q5/17
� |
2016-08-16 |
|
[ 576 ]
�
(Rev.1)� |
Proposed new work item-- Guidelines on security of big data platform services in cloud computing
�
� |
China
,
China Mobile Communications Corporation
� |
Q8/17
� |
2016-08-16 |
|
[ 574 ]
�
� |
Proposal for a new work item on Security Requirements of Network as a Service (NaaS) in Cloud Computing
�
� |
China Mobile Communications Corporation
,
China Unicom
� |
Q8/17
� |
2016-08-16 |
|
[ 565 ]
�
(Rev.1-2)� |
Proposal for a new work item: Risk control on the assets accessible by the internet for the telecommunication organizations
�
� |
China Mobile Communications Corporation
,
China Unicom
� |
Q3/17
� |
2016-08-15 |
|
[ 564 ]
�
(Rev.1-2)� |
Proposal for a new work item: Security requirements for communication as a service application environments
�
� |
China
,
China Mobile Communications Corporation
� |
Q8/17
� |
2016-08-15 |
|
[ 563 ]
�
(Rev.1-3)� |
Applying for the agreement of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE, supplement to X.1245
�
� |
China Mobile Communications Corporation
,
China Unicom
� |
Q5/17
� |
2016-08-15 |
|
[ 562 ]
�
(Rev.1-3)� |
The finalized draft for determination of X.msec-11: Guidelines on mitigating the negative effects of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2016-08-15 |
|
[ 561 ]
�
(Rev.1)� |
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators)
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2016-08-15 |
|
[ 560 ]
�
� |
Proposal for the 4th revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Unicom
,
ZTE Corporation
� |
Q6/17, Q2/17
� |
2016-08-14 |
|
[ 544 ]
�
� |
Proposal for a new work item to ITU-T Recommendation X DSMM
�
� |
Alibaba China Co. Ltd.
,
China Mobile Communications Corporation
,
China Unicom
,
ZTE Corporation
� |
Q2/17, (Q3/17)
� |
2016-03-01 |
|
[ 526 ]
�
� |
Proposed new work item on Security Framework for VoLTE Operation
�
� |
China Mobile Communications Corporation
� |
Q2/17
� |
2016-02-29 |
|
[ 496 ]
�
(Rev.1-2)� |
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators)
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2016-02-27 |
|
[ 495 ]
�
(Rev.1-3)� |
The 3rd draft of X.ticsc: Technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE), supplement to X.1245
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2016-02-27 |
|
[ 494 ]
�
(Rev.1-2)� |
A proposal of new work item: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2016-02-27 |
|
[ 477 ]
�
� |
Proposal for the 2nd revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Unicom
,
ZTE Corporation
� |
Q2/17
� |
2016-02-23 |
|
[ 446 ]
�
� |
2nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2015-08-26 |
|
[ 425 ]
�
(Rev.1)� |
Security reference architecture for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 424 ]
�
� |
Security threats and security requirements for SDN Resource-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 423 ]
�
� |
Security threats and security requirements for SDN Application-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking.
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 422 ]
�
� |
Security threats and security requirements for SDN Resource Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 421 ]
�
� |
Security threats and security requirements for SDN Control Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
�
� |
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q2/17
� |
2015-08-25 |
|
[ 399 ]
�
� |
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators
�
� |
China Mobile Communications Corporation
,
Electronics and Telecommunications Research Institute (ETRI)
,
ZTE Corporation
� |
Q7/17
� |
2015-08-24 |
|
[ 372 ]
�
(Rev.1)� |
Draft Recommendation ITU-T X.authi: Guidelines and framework for sharing network authentication results with service applications
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2015-03-26 |
|
[ 320 ]
�
� |
A proposal for text improvement of X.msec-7
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2015-03-19 |
|
[ 319 ]
�
� |
Gap Analysis between IETF STIR [rfc7375] and X.ticvs to assist the finalization of X.ticvs
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2015-03-19 |
|
[ 318 ]
�
(Rev.1-4)� |
First Draft of X.ticsc, Supplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
�
� |
China Mobile Communications Corporation
,
China Unicom
� |
Q5/17
� |
2015-03-19 |
|
[ 289 ]
�
� |
Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2014-09-03 |
|
[ 288 ]
�
� |
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2014-09-03 |
|
[ 287 ]
�
(Rev.1)� |
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2014-09-03 |
|
[ 285 ]
�
(Rev.1)� |
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2014-09-03 |
|
[ 284 ]
�
(Rev.1)� |
Proposals to protect the PII data in X.gpim
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2014-09-03 |
|
[ 283 ]
�
� |
Draft X.authi: Guideline to implement the integration of service authentication with network authentication
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2014-09-03 |
|
[ 183 ]
�
(Rev.1)� |
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2013-12-31 |
|
[ 180 ]
�
(Rev.1)� |
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2013-12-31 |
|
[ 179 ]
�
(Rev.1)� |
X.authi: Guideline to implement the authentication integration of the network layer and the service layer
�
� |
China Mobile Communications Corporation
,
China
,
ZTE Corporation
� |
Q10/17
� |
2013-12-31 |
|
[ 178 ]
�
(Rev.1)� |
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2013-12-31 |
|
[ 156 ]
�
� |
Comments on the new work item X.tfcmm
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2013-08-15 |
|
[ 155 ]
�
� |
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2013-08-15 |
|
[ 77 ]
�
(Rev.1)� |
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based networks
�
� |
China Mobile Communications Corporation
� |
Q4/17
� |
2013-04-03 |
|
[ 76 ]
�
(Rev.1)� |
Difference between the PII (personally identifiable information) in mobile telecom network and that in traditional systems
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2013-04-03 |
|
[ 74 ]
�
(Rev.1)� |
Proposal for updating the text of sub-section into X.gpim
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2013-04-03 |
|
[ 72 ]
�
(Rev.1)� |
Proposal text for section 8.4 "Digital right management mechanism in streaming service" in X.p2p-3
�
� |
China Mobile Communications Corporation
� |
Q7/17
� |
2013-04-03 |
|
[ 70 ]
�
(Rev.1)� |
Sample analysis of mobile malicious software
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2013-04-03 |
|
[ 68 ]
�
(Rev.1)� |
Proposed text of Clause 10 and bibliography in X.authi
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2013-04-03 |
|
[ 66 ]
�
(Rev.1)� |
IdM requirements for X.idmcc chap7
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2013-04-03 |
|
[ 64 ]
�
(Rev.1)� |
IdM requirements for X.idmcc chap8
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2013-04-03 |
|
[ 63 ]
�
(Rev.1)� |
Proposed edits to X.goscc
�
� |
China Mobile Communications Corporation
� |
Q8/17
� |
2013-04-03 |
|
[ 61 ]
�
(Rev.1)� |
Comments on the latest draft of X.goscc
�
� |
China Mobile Communications Corporation
� |
Q8/17
� |
2013-04-03 |
|
[ 59 ]
�
(Rev.1)� |
Proposal of new work item: Framework of on-demand cloud security
�
� |
China Mobile Communications Corporation
� |
Q8/17
� |
2013-04-03 |
|
[ 57 ]
�
(Rev.1-2)� |
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2013-04-03 |
Results:52 total items. Result page:�
1 -
2
�-�Next
� |
Multiple Document Download:�Formats and Languages to be included (when available):