Uni�n Internacional de Telecomunicaciones UIT
EnglishFran�ais
Mapa Cont�ctenos Copia Imprimible
P�gina principal : UIT-T : SG 17 : Contribuciones� Nuevo�-� Busque los documentos de la reuni�n
UIT-T�SG 17� C�

UIT-T�SG 17

Seguridad

Periodo de estudios 2009

Resultados :60 documentos
Resultados :� 1 - 2 �-�Siguiente Next
Contribuciones �[�Origen:�China Mobile�]���Documents / Contributions

N�mero
T�tulo Origen AI/Cuesti�n
Fecha
[ 691 ]
Proposed Edits to clause 9&10 in X.ccsec � China , China Mobile Communications Corporation Q8/17 2012-08-15
[ 690 ]
X.abnot: Abnormal traffic detection and control guideline for telecommunication network � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. , ZTE Corporation Q4/17 2012-08-15
[ 689 ]
1st Draft: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2012-08-15
[ 688 ]
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2012-08-15
[ 687 ]
Authentication integration solution for IMS scenario in X.authi - part 2. � China Mobile Communications Corporation Q10/17 2012-08-15
[ 686 ]
Authentication integration solution for IMS scenario in X.authi - part 1. � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-08-15
[ 685 ]
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection � China Mobile Communications Corporation , ZTE Corporation Q3/17 2012-08-15
[ 589 ]
Security Protection of Customer Information in Telecom Operators � China Mobile Communications Corporation , ZTE Corporation Q3/17 2012-02-07
[ 588 ]
Authentication result transfer based on encrypted cookie for WLAN scenario � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-02-07
[ 587 ]
Interface of the abnormal traffic detection and control system � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. Q4/17 2012-02-07
[ 586 ]
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks � China Mobile Communications Corporation Q6/17 2012-02-07
[ 585 ]
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks" � China Mobile Communications Corporation Q6/17 2012-02-07
[ 584 ]
A Draft of Technology Involved in Countering Voice Spam-X.ticvs � China Mobile Communications Corporation Q5/17 2012-02-07
[ 583 ]
Authentication integration solution for WLAN scenario in X.authi. � China Mobile Communications Corporation , ZTE Corporation Q10/17 2012-02-07
[ 515 ]
Authentication integration based on authentication gateway in X.authi � China Mobile Communications Corporation , ZTE Corporation Q10/17 2011-08-10
[ 514 ]
Authentication integration based on network authentication result transfer in X.authi � China Mobile Communications Corporation , ZTE Corporation Q10/17 2011-08-10
[ 513 ]
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization � China Mobile Communications Corporation Q3/17 2011-08-10
[ 512 ]
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations � China Mobile Communications Corporation Q5/17, Q4/17 2011-08-10
[ 511 ]
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks � China Mobile Communications Corporation Q4/17 2011-08-10
[ 510 ]
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection � China Mobile Communications Corporation Q5/17 2011-08-10
[ 509 ]
Performance and Interface of the abnormal traffic detection and control system � China Mobile Communications Corporation , Huawei Technologies Co. Ltd. Q4/17 2011-08-10
[ 508 ]
Proposed draft Recommendation for X.authi: Authentication integration in IDM � China Mobile Communications Corporation , ZTE Corporation Q10/17 2011-08-10
[ 507 ]
VoIP security mechanism of X.p2p-3 � China , China Mobile Communications Corporation , ZTE Corporation Q7/17 2011-08-10
[ 410 ]
(Rev.1)
Propose a chapter on virtualization security for X.srfctse � ZTE Corporation, China Mobile Q8/17 2011-03-29
[ 328 ]
Propose an authentication method involving Authentication Router for X.srfctse � ZTE Corporation, China Mobile Q8/17 2010-11-25
[ 327 ]
Propose a federation gateway for X.srfctse � ZTE Corporation, China Mobile Q8/17 2010-11-25
[ 326 ]
(Rev.1)
Proposal for updating "Procedure of security policy distribution" section in X.gpn � ZTE, China Mobile Q4/17 2010-11-25
[ 325 ]
Proposal for new work item on security requirements and framework of ubiquitous networking � ZTE, China Unicom, China Mobile Q6/17 2010-11-25
[ 302 ]
Trust management evaluation criteria of X.p2p-3 � China Mobile Q7/17 2010-11-25
[ 301 ]
Trust management assumption of X.p2p-3 � China Mobile Q7/17 2010-11-25
[ 300 ]
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network � China Mobile Q7/17 2010-11-25
[ 266 ]
User authentication mechanism of X.p2p-3 � China Mobile, China MII, ZTE Q7/17 2010-03-26
[ 264 ]
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network � China Mobile, China MII, ZTE Q7/17 2010-03-26
[ 261 ]
Proposed draft Recommendation for X.authi: Authentication Integration in IDM � China Mobile, China MII, ZTE Q10/17 2010-03-26
[ 260 ]
Proposed draft Rec. X.ismf, Information security management framework � China Mobile Q3/17 2010-03-26
[ 257 ]
Organization and Personnel part in X.ismf � China Mobile Q3/17 2010-03-26
[ 254 ]
Comparing analysis of abnormal traffic system deployment solutions in X.abnot � China Mobile, Huawei Q4/17 2010-03-26
[ 252 ]
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2010-03-26
[ 251 ]
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � ZTE, China Mobile Q4/17 2010-03-26
[ 243 ]
Assets Management in X.ismf � China Mobile Q3/17 2010-03-26
[ 242 ]
An analysis of X.authi: Authentication integration between the network and service layers � China Mobile, China MII, ZTE Q10/17 2010-03-26
[ 241 ]
A solution to solve the repeated clean problem in the abnormal traffic control system deployment � China Mobile, Huawei Q4/17 2010-03-26
[ 180 ]
+Corr.1
Proposed text for section 6 of X.idmgen � China Mobile, ZTE Corporation Q10/17 2009-09-07
[ 179 ]
+Corr.1
Proposed text for authentication assurance interoperation in X.idm-ifa � China Mobile, ZTE Corporation Q10/17 2009-09-07
[ 178 ]
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 177 ]
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 176 ]
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 175 ]
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security � China Mobile, ZTE Q4/17 2009-09-07
[ 174 ]
+Corr.1
Proposed text for trust establishment in X.idm-ifa � China Mobile, ZTE Corporation Q10/17 2009-09-07
[ 105 ]
Basic concept for authentication mechanism of P2P-based telecommunication network � China Mobile, China MII, ZTE Q7/17 2009-09-03
Resultados :60 documentos
Resultados :� 1 - 2 �-�Siguiente Next
Telecarga de m�ltiples documentos:�Marcar las casillas correspondientes a los documentos seleccionados, a continuaci�n pulsar "Telecargar"

Preferencias del usuario:
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):
P�ginas de navegaci�n HTML
Formatos �+�Otros formatos
Idiomas (m�ximo 2) �+�Multiling�e �
(E: ingl�s - F: franc�s - S: espa�ol - A: �rabe - C: chino - R: ruso)

Pruebe ITU Translate, la herramienta de traducci�n autom�tica de documentos
Comienzo de la p�gina�-� Comentarios�-� Cont�ctenos�-� Copyright � UIT�2008�Reservados todos los derechos
Contacto p�blico :� TSB EDH
Actualizado el :�2025-1-11