Contribuciones
�[�AI/Cuesti�n:�Q2/17�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 753 ]
�
(Rev.1)� |
Comments on draft IPv6 Security Guideline for Telecommunications
�
� |
KDDI Corporation
,
National Institute of Information and Communications Technology
� |
Q2/17
� |
2012-08-16 |
|
[ 752 ]
�
(Rev.1)� |
Proposed revised text for X.gssiso
�
� |
China
,
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 716 ]
�
� |
Contribution for X.gsiiso (Security Objectives)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 715 ]
�
� |
Contribution for X.gsiiso(Security Requirements)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 712 ]
�
� |
Contribution for X.gsiiso (Functional Parts and Service Procedures)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 711 ]
�
� |
Contribution for X.gsiiso(Relationship between User, Pipe and Content)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 706 ]
�
� |
Introduction of Test Access Point and Optical Splitter
�
� |
ZTE Corporation
� |
Q2/17
� |
2012-08-16 |
|
[ 693 ]
�
� |
Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks for determination
�
� |
Russian Federation
� |
Q2/17
� |
2012-08-15 |
|
[ 692 ]
�
� |
Draft Recommendation of the ITU-T X.ncns-1 �Guidance for creating National IP-based public network security center for developing countries� for determination
�
� |
Russian Federation
� |
Q2/17
� |
2012-08-15 |
|
[ 678 ]
�
� |
Draft text of X.mgv6 (Security management guideline for implementation of IPv6 environment in telecommunications organizations) - Supplement of X.ipv6-secguide
�
� |
KDDI Corporation
,
National Institute of Information and Communications Technology (NICT)
� |
Q3/17, Q2/17
� |
2012-08-15 |
|
[ 657 ]
�
� |
Proposed revised text for clause 10 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 656 ]
�
� |
Proposed revised text for clause 9 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 654 ]
�
� |
Proposed revised text for clause 8.3 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 653 ]
�
� |
Proposed revised text for clause 8.2 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 652 ]
�
� |
Proposed revised text for clause 8.1 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 642 ]
�
(Rev.1)� |
Comments on draft Recommendation X.OVAL
�
� |
Canada
� |
Q4/17, Q2/17
� |
2012-02-07 |
|
[ 641 ]
�
(Rev.1)� |
Comments on draft Recommendation X.xccdf
�
� |
Canada
� |
Q4/17, Q2/17
� |
2012-02-07 |
|
[ 635 ]
�
(Rev.1)� |
Comments on draft Recommendation X.1037
�
� |
Canada
� |
Q2/17
� |
2012-02-07 |
|
[ 634 ]
�
(Rev.1)� |
Three principles for any ITU-T Child Online Protection work
�
� |
United States
� |
Q2/17
� |
2012-02-07 |
|
[ 633 ]
�
(Rev.1)� |
US edits to draft Recommendation X.1037 in response to Circular 228
�
� |
United States
� |
Q2/17
� |
2012-02-07 |
|
[ 625 ]
�
� |
Coordinating Activity in Cloud Computing Security
�
� |
Russian Federation
� |
Q2/17
� |
2012-02-07 |
|
[ 612 ]
�
� |
Comments on draft IPv6 Security Guideline for Telecommunications
�
� |
KDDI Corporation
,
National Institute of Information and Communications Technology (NICT)
� |
Q2/17
� |
2012-02-07 |
|
[ 600 ]
�
� |
UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks
�
� |
United Kingdom
� |
Q2/17
� |
2012-02-07 |
|
[ 517 ]
�
(Rev.1)� |
Technical security guideline on deploying IPv6
�
� |
KDDI Corporation
,
National Institute of Information and Communications Technology
� |
Q3/17, Q2/17
� |
2011-08-11 |
|
[ 454 ]
�
� |
Proposal of the creation of a new work item "technical security guideline on deploying IPv6"
�
� |
NICT
,
KDDI Corporation
� |
Q2/17
� |
2011-03-30 |
|
[ 422 ]
�
� |
Propose draft text for X.gsiiso: Guidelines on security of the individual information service for operators
�
� |
CATR, MIIT, China
� |
Q2/17
� |
2011-03-30 |
|
[ 379 ]
�
� |
Draft Recommendation ITU-T X.rev, Architectural systems for security controls for preventing fraudulent activities in public carrier networks
�
� |
Administration of the Russian Federation
� |
Q2/17
� |
2011-03-24 |
|
[ 377 ]
�
� |
Heterarchic architecture for secure distributed service networks
�
� |
Administration of the Russian Federation
� |
Q7/17, Q2/17, Q10/17
� |
2011-03-25 |
|
[ 375 ]
�
� |
Draft ITU-T Recommendation X.ncns-1, National IP-based public network security center for developing countries
�
� |
Administration of the Russian Federation
� |
Q2/17
� |
2011-03-24 |
|
[ 370 ]
�
� |
Revised text of X.gsiiso : Guidelines on security of the individual information service for operators
�
� |
CATR, MIIT, China
� |
Q2/17
� |
2010-11-29 |
|
[ 346 ]
�
� |
Draft text of Recommendation ITU-T X.1034 (revised) for consent
�
� |
Korea (Republic of)
� |
Q2/17
� |
2010-11-26 |
|
[ 330 ]
�
� |
Direction on Studies related to Revenue Assurance
�
� |
UK
� |
Q2/17
� |
2010-11-26 |
|
[ 313 ]
�
� |
Proposed modification to X.interfaces
�
� |
China Unicom
� |
Q2/17
� |
2010-11-25 |
|
[ 285 ]
�
� |
Comments on draft Rec. ITU-T X.1032 (COM 17-R15) under TAP
�
� |
France Telecom Orange
� |
Q2/17
� |
2010-10-11 |
|
[ 220 ]
�
� |
A proposal for the 3rd draft text of revised Recommendation ITU-T X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network
�
� |
Korea (Republic of)
� |
Q2/17
� |
2010-03-26 |
|
[ 130 ]
�
� |
Proposal for the 2nd draft text for revised Recommendation X.1034: Guideline on extensible authentication protocol based authentication and key management in a data communication network
�
� |
Korea (Republic of)
� |
Q2/17
� |
2009-09-04 |
|
[ 112 ]
�
� |
Comments on draft Recommendation X.interfaces
�
� |
Germany
� |
Q2/17
� |
2009-09-04 |
|
[ 89 ]
�
� |
Proposal of new work item about the creation the basic rules to create the system to protect TELCO from fraud and revenue leakage. "Revenue leakage protection"
�
� |
Telecommunications Administration of Russian Federation
� |
Q2/17, Q1/17
� |
2009-08-31 |
|
[ 53 ]
�
� |
Proposal for the first draft text of Recommendation X.1034, Amd. 1 : Guideline on extensible authentication protocol based authentication and key management in a data communication network
�
� |
Korea
� |
Q2/17
� |
2009-02-02 |
|
[ 5 ]
�
� |
Proposal for new work item on the guide of security of the individual information service for operators
�
� |
China MIIT
,
China Mobile
� |
Q2/17
� |
2009-02-02 |
Resultados :40 documentos
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):