International Telecommunication Union ITU
Fran�aisEspa�ol
Site map Contact Us Print version
Home : ITU-T : SG 17 : Contributions� Recently posted�-� Search Meeting Documents
ITU-T�SG 17� C�

ITU-T�SG 17

Security

Study Period 2013

Results:52 total items.
Result page:� 1 - 2 �-�Next Next
Contributions �[�Source:�China Mobile Communications Corporation�]���Documents / Contributions

Number
Title Source AI/Question
Date
[ 605 ]
Proposal for a new work item: Technical Framework for Countering Telephone Fraud � China , China Mobile Communications Corporation , China Unicom Q5/17 2016-08-16
[ 576 ]
(Rev.1)
Proposed new work item-- Guidelines on security of big data platform services in cloud computing � China , China Mobile Communications Corporation Q8/17 2016-08-16
[ 574 ]
Proposal for a new work item on Security Requirements of Network as a Service (NaaS) in Cloud Computing � China Mobile Communications Corporation , China Unicom Q8/17 2016-08-16
[ 565 ]
(Rev.1-2)
Proposal for a new work item: Risk control on the assets accessible by the internet for the telecommunication organizations � China Mobile Communications Corporation , China Unicom Q3/17 2016-08-15
[ 564 ]
(Rev.1-2)
Proposal for a new work item: Security requirements for communication as a service application environments � China , China Mobile Communications Corporation Q8/17 2016-08-15
[ 563 ]
(Rev.1-3)
Applying for the agreement of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE, supplement to X.1245 � China Mobile Communications Corporation , China Unicom Q5/17 2016-08-15
[ 562 ]
(Rev.1-3)
The finalized draft for determination of X.msec-11: Guidelines on mitigating the negative effects of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2016-08-15
[ 561 ]
(Rev.1)
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators) � China Mobile Communications Corporation Q7/17 2016-08-15
[ 560 ]
Proposal for the 4th revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Unicom , ZTE Corporation Q6/17, Q2/17 2016-08-14
[ 544 ]
Proposal for a new work item to ITU-T Recommendation X DSMM � Alibaba China Co. Ltd. , China Mobile Communications Corporation , China Unicom , ZTE Corporation Q2/17, (Q3/17) 2016-03-01
[ 526 ]
Proposed new work item on Security Framework for VoLTE Operation � China Mobile Communications Corporation Q2/17 2016-02-29
[ 496 ]
(Rev.1-2)
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators) � China Mobile Communications Corporation Q7/17 2016-02-27
[ 495 ]
(Rev.1-3)
The 3rd draft of X.ticsc: Technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE), supplement to X.1245 � China Mobile Communications Corporation Q5/17 2016-02-27
[ 494 ]
(Rev.1-2)
A proposal of new work item: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2016-02-27
[ 477 ]
Proposal for the 2nd revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Unicom , ZTE Corporation Q2/17 2016-02-23
[ 446 ]
2nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE � China Mobile Communications Corporation Q5/17 2015-08-26
[ 425 ]
(Rev.1)
Security reference architecture for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 424 ]
Security threats and security requirements for SDN Resource-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 423 ]
Security threats and security requirements for SDN Application-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking. � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 422 ]
Security threats and security requirements for SDN Resource Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 421 ]
Security threats and security requirements for SDN Control Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 399 ]
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators � China Mobile Communications Corporation , Electronics and Telecommunications Research Institute (ETRI) , ZTE Corporation Q7/17 2015-08-24
[ 372 ]
(Rev.1)
Draft Recommendation ITU-T X.authi: Guidelines and framework for sharing network authentication results with service applications � China Mobile Communications Corporation Q10/17 2015-03-26
[ 320 ]
A proposal for text improvement of X.msec-7 � China Mobile Communications Corporation Q6/17 2015-03-19
[ 319 ]
Gap Analysis between IETF STIR [rfc7375] and X.ticvs to assist the finalization of X.ticvs � China Mobile Communications Corporation Q5/17 2015-03-19
[ 318 ]
(Rev.1-4)
First Draft of X.ticsc, Supplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE � China Mobile Communications Corporation , China Unicom Q5/17 2015-03-19
[ 289 ]
Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE � China Mobile Communications Corporation Q5/17 2014-09-03
[ 288 ]
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2014-09-03
[ 287 ]
(Rev.1)
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2014-09-03
[ 285 ]
(Rev.1)
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network � China Mobile Communications Corporation Q7/17 2014-09-03
[ 284 ]
(Rev.1)
Proposals to protect the PII data in X.gpim � China Mobile Communications Corporation Q3/17 2014-09-03
[ 283 ]
Draft X.authi: Guideline to implement the integration of service authentication with network authentication � China Mobile Communications Corporation Q10/17 2014-09-03
[ 183 ]
(Rev.1)
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2013-12-31
[ 180 ]
(Rev.1)
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2013-12-31
[ 179 ]
(Rev.1)
X.authi: Guideline to implement the authentication integration of the network layer and the service layer � China Mobile Communications Corporation , China , ZTE Corporation Q10/17 2013-12-31
[ 178 ]
(Rev.1)
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations" � China Mobile Communications Corporation Q3/17 2013-12-31
[ 156 ]
Comments on the new work item X.tfcmm � China Mobile Communications Corporation Q5/17 2013-08-15
[ 155 ]
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2013-08-15
[ 77 ]
(Rev.1)
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based networks � China Mobile Communications Corporation Q4/17 2013-04-03
[ 76 ]
(Rev.1)
Difference between the PII (personally identifiable information) in mobile telecom network and that in traditional systems � China Mobile Communications Corporation Q3/17 2013-04-03
[ 74 ]
(Rev.1)
Proposal for updating the text of sub-section into X.gpim � China Mobile Communications Corporation Q3/17 2013-04-03
[ 72 ]
(Rev.1)
Proposal text for section 8.4 "Digital right management mechanism in streaming service" in X.p2p-3 � China Mobile Communications Corporation Q7/17 2013-04-03
[ 70 ]
(Rev.1)
Sample analysis of mobile malicious software � China Mobile Communications Corporation Q6/17 2013-04-03
[ 68 ]
(Rev.1)
Proposed text of Clause 10 and bibliography in X.authi � China Mobile Communications Corporation Q10/17 2013-04-03
[ 66 ]
(Rev.1)
IdM requirements for X.idmcc chap7 � China Mobile Communications Corporation Q10/17 2013-04-03
[ 64 ]
(Rev.1)
IdM requirements for X.idmcc chap8 � China Mobile Communications Corporation Q10/17 2013-04-03
[ 63 ]
(Rev.1)
Proposed edits to X.goscc � China Mobile Communications Corporation Q8/17 2013-04-03
[ 61 ]
(Rev.1)
Comments on the latest draft of X.goscc � China Mobile Communications Corporation Q8/17 2013-04-03
[ 59 ]
(Rev.1)
Proposal of new work item: Framework of on-demand cloud security � China Mobile Communications Corporation Q8/17 2013-04-03
[ 57 ]
(Rev.1-2)
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2013-04-03
Results:52 total items.
Result page:� 1 - 2 �-�Next Next
Multiple Document Download:�Check the boxes of the selected documents, then click "Zip and download"

User preferences:
Multiple Document Download:�Formats and Languages to be included (when available):
HTML Navigation Pages
Formats �+�Other formats
Languages (maximum 2) �+�Multilingual�
(E: English - F: French - S: Spanish - A: Arabic - C: Chinese - R: Russian)

Test ITU Translate for automated document translation
Top�-� Feedback�-� Contact Us�-� Copyright � ITU�2008�All Rights Reserved
Contact for this page :� TSB EDH
Updated :�2025-1-24