Contribuciones
�[�Origen:�China�]��� |
�
|
N�mero�
|
T�tulo
|
Origen
|
AI/Cuesti�n
|
Fecha
|
|
[ 752 ]
�
(Rev.1)� |
Proposed revised text for X.gssiso
�
� |
China
,
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 717 ]
�
� |
Contribution for X.abnot(Inline Control Latency Problem)
�
� |
China Unicom
� |
Q4/17
� |
2012-08-16 |
|
[ 716 ]
�
� |
Contribution for X.gsiiso (Security Objectives)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 715 ]
�
� |
Contribution for X.gsiiso(Security Requirements)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 713 ]
�
� |
Draft text of Recommendation ITU-T X.ccsec: High-level Security Framework for Cloud Computing
�
� |
China
,
China Telecommunications Corporation
,
Microsoft Corporation
,
ZTE Corporation
� |
Q8/17
� |
2012-08-16 |
|
[ 712 ]
�
� |
Contribution for X.gsiiso (Functional Parts and Service Procedures)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 711 ]
�
� |
Contribution for X.gsiiso(Relationship between User, Pipe and Content)
�
� |
China Unicom
� |
Q2/17
� |
2012-08-16 |
|
[ 703 ]
�
(Rev.1)� |
Proposed text for chapter 8 of X.goscc
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-08-16 |
|
[ 691 ]
�
� |
Proposed Edits to clause 9&10 in X.ccsec
�
� |
China
,
China Mobile Communications Corporation
� |
Q8/17
� |
2012-08-15 |
|
[ 690 ]
�
� |
X.abnot: Abnormal traffic detection and control guideline for telecommunication network
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
,
ZTE Corporation
� |
Q4/17
� |
2012-08-15 |
|
[ 689 ]
�
� |
1st Draft: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-08-15 |
|
[ 688 ]
�
� |
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2012-08-15 |
|
[ 687 ]
�
� |
Authentication integration solution for IMS scenario in X.authi - part 2.
�
� |
China Mobile Communications Corporation
� |
Q10/17
� |
2012-08-15 |
|
[ 686 ]
�
� |
Authentication integration solution for IMS scenario in X.authi - part 1.
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-08-15 |
|
[ 685 ]
�
� |
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q3/17
� |
2012-08-15 |
|
[ 675 ]
�
(Rev.1)� |
Proposed text for X.ccsec describing workflow.
�
� |
China
,
Microsoft Corporation
,
ZTE Corporation
� |
Q8/17
� |
2012-08-14 |
|
[ 658 ]
�
� |
Proposed revised text for X.ccsec
�
� |
China
� |
Q8/17
� |
2012-02-08 |
|
[ 657 ]
�
� |
Proposed revised text for clause 10 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 656 ]
�
� |
Proposed revised text for clause 9 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 654 ]
�
� |
Proposed revised text for clause 8.3 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 653 ]
�
� |
Proposed revised text for clause 8.2 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 652 ]
�
� |
Proposed revised text for clause 8.1 of X.gsiiso
�
� |
China
� |
Q2/17
� |
2012-02-08 |
|
[ 651 ]
�
� |
Proposed text for clause 8.1 of X.ccsec
�
� |
China
� |
Q8/17
� |
2012-02-08 |
|
[ 598 ]
�
� |
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China
,
China Unicom
� |
Q5/17
� |
2012-02-07 |
|
[ 597 ]
�
� |
Comments on X.ics: A practical reference model for countering email spam using botnet information
�
� |
China
� |
Q5/17
� |
2012-02-07 |
|
[ 596 ]
�
� |
Proposal to establish a tutorial mechanism for new technologies
�
� |
China
� |
QALL/17
� |
2012-02-07 |
|
[ 595 ]
�
� |
Updated text of X.msec-6: Security aspects of smartphones
�
� |
China
� |
Q6/17
� |
2012-02-07 |
|
[ 594 ]
�
� |
Proposal on security requirements of digital distribution platforms of X.msec-6
�
� |
China
� |
Q6/17
� |
2012-02-07 |
|
[ 593 ]
�
� |
Updated text of X.oacms: Overall aspects of countering mobile messaging spam
�
� |
China
� |
Q5/17
� |
2012-02-07 |
|
[ 592 ]
�
� |
Proposal on changing the title name of X.msec-6 back to smartphone
�
� |
China
,
China Unicom
� |
Q6/17
� |
2012-02-07 |
|
[ 589 ]
�
� |
Security Protection of Customer Information in Telecom Operators
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q3/17
� |
2012-02-07 |
|
[ 588 ]
�
� |
Authentication result transfer based on encrypted cookie for WLAN scenario
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 587 ]
�
� |
Interface of the abnormal traffic detection and control system
�
� |
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
� |
Q4/17
� |
2012-02-07 |
|
[ 586 ]
�
� |
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 585 ]
�
� |
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2012-02-07 |
|
[ 584 ]
�
� |
A Draft of Technology Involved in Countering Voice Spam-X.ticvs
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2012-02-07 |
|
[ 583 ]
�
� |
Authentication integration solution for WLAN scenario in X.authi.
�
� |
China Mobile Communications Corporation
,
ZTE Corporation
� |
Q10/17
� |
2012-02-07 |
|
[ 575 ]
�
(Rev.1)� |
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets
�
� |
China Unicom
� |
Q7/17
� |
2012-02-07 |
|
[ 566 ]
�
� |
Proposed text for security guidelines chapter of X.ccsec
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-02-06 |
|
[ 565 ]
�
� |
Proposed text for security challenges chapter of X.ccsec
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-02-06 |
|
[ 564 ]
�
� |
Proposed new work item on Requirements and framework of operational security for Cloud Computing
�
� |
China
,
China Telecommunications Corporation
,
ZTE Corporation
� |
Q8/17
� |
2012-02-06 |
|
[ 560 ]
�
(Rev.1-2)� |
Proposal on new appendix for X.msec-6
�
� |
China
,
China Unicom
� |
Q6/17
� |
2012-02-06 |
|
[ 559 ]
�
(Rev.1)� |
The security threats of disclosure and congestion for ubiquitous networking
�
� |
China Unicom
� |
Q6/17
� |
2012-02-06 |
|
[ 558 ]
�
(Rev.1)� |
The security threats of eavesdropping and tamper for ubiquitous networking
�
� |
China Unicom
� |
Q6/17
� |
2012-02-06 |
|
[ 557 ]
�
(Rev.1)� |
The security threats of Denial of Service and abuse for ubiquitous networking
�
� |
China Unicom
� |
Q6/17
� |
2012-02-06 |
|
[ 553 ]
�
� |
Proposed a chapter on SaaS levels for X.sfcse
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-02-02 |
|
[ 552 ]
�
(Rev.1-2)� |
Proposed revised baseline text for X.sfcse
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2012-02-02 |
|
[ 546 ]
�
� |
Propose content re-organization for X.srfctse
�
� |
China
,
ZTE Corporation
� |
Q8/17
� |
2011-08-16 |
|
[ 542 ]
�
(Rev.1)� |
Proposed text for clause 8.3 of X.ccsec
�
� |
China
� |
Q8/17
� |
2011-08-11 |
|
[ 541 ]
�
(Rev.1)� |
Proposed revised text for X.ccsec
�
� |
China
� |
Q8/17
� |
2011-08-11 |
Resultados :164 documentos Resultados :�
1 -
2 -
3 -
4
�-�Siguiente
� |
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):