Uni�n Internacional de Telecomunicaciones UIT
EnglishFran�ais
Mapa Cont�ctenos Copia Imprimible
P�gina principal : UIT-T : SG 17 : Contribuciones� Nuevo�-� Busque los documentos de la reuni�n
UIT-T�SG 17� C�

UIT-T�SG 17

Seguridad

Periodo de estudios 2013

Resultados :52 documentos
Resultados :� 1 - 2 �-�Siguiente Next
Contribuciones �[�Origen:�China Mobile Communications Corporation�]���Documents / Contributions

N�mero
T�tulo Origen AI/Cuesti�n
Fecha
[ 605 ]
Proposal for a new work item: Technical Framework for Countering Telephone Fraud � China , China Mobile Communications Corporation , China Unicom Q5/17 2016-08-16
[ 576 ]
(Rev.1)
Proposed new work item-- Guidelines on security of big data platform services in cloud computing � China , China Mobile Communications Corporation Q8/17 2016-08-16
[ 574 ]
Proposal for a new work item on Security Requirements of Network as a Service (NaaS) in Cloud Computing � China Mobile Communications Corporation , China Unicom Q8/17 2016-08-16
[ 565 ]
(Rev.1-2)
Proposal for a new work item: Risk control on the assets accessible by the internet for the telecommunication organizations � China Mobile Communications Corporation , China Unicom Q3/17 2016-08-15
[ 564 ]
(Rev.1-2)
Proposal for a new work item: Security requirements for communication as a service application environments � China , China Mobile Communications Corporation Q8/17 2016-08-15
[ 563 ]
(Rev.1-3)
Applying for the agreement of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE, supplement to X.1245 � China Mobile Communications Corporation , China Unicom Q5/17 2016-08-15
[ 562 ]
(Rev.1-3)
The finalized draft for determination of X.msec-11: Guidelines on mitigating the negative effects of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2016-08-15
[ 561 ]
(Rev.1)
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators) � China Mobile Communications Corporation Q7/17 2016-08-15
[ 560 ]
Proposal for the 4th revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Unicom , ZTE Corporation Q6/17, Q2/17 2016-08-14
[ 544 ]
Proposal for a new work item to ITU-T Recommendation X DSMM � Alibaba China Co. Ltd. , China Mobile Communications Corporation , China Unicom , ZTE Corporation Q2/17, (Q3/17) 2016-03-01
[ 526 ]
Proposed new work item on Security Framework for VoLTE Operation � China Mobile Communications Corporation Q2/17 2016-02-29
[ 496 ]
(Rev.1-2)
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators) � China Mobile Communications Corporation Q7/17 2016-02-27
[ 495 ]
(Rev.1-3)
The 3rd draft of X.ticsc: Technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE), supplement to X.1245 � China Mobile Communications Corporation Q5/17 2016-02-27
[ 494 ]
(Rev.1-2)
A proposal of new work item: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2016-02-27
[ 477 ]
Proposal for the 2nd revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Unicom , ZTE Corporation Q2/17 2016-02-23
[ 446 ]
2nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE � China Mobile Communications Corporation Q5/17 2015-08-26
[ 425 ]
(Rev.1)
Security reference architecture for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 424 ]
Security threats and security requirements for SDN Resource-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 423 ]
Security threats and security requirements for SDN Application-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking. � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 422 ]
Security threats and security requirements for SDN Resource Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 421 ]
Security threats and security requirements for SDN Control Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking � Alcatel-Lucent Shanghai Bell , China Mobile Communications Corporation , China Telecommunications Corporation , ZTE Corporation Q2/17 2015-08-25
[ 399 ]
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators � China Mobile Communications Corporation , Electronics and Telecommunications Research Institute (ETRI) , ZTE Corporation Q7/17 2015-08-24
[ 372 ]
(Rev.1)
Draft Recommendation ITU-T X.authi: Guidelines and framework for sharing network authentication results with service applications � China Mobile Communications Corporation Q10/17 2015-03-26
[ 320 ]
A proposal for text improvement of X.msec-7 � China Mobile Communications Corporation Q6/17 2015-03-19
[ 319 ]
Gap Analysis between IETF STIR [rfc7375] and X.ticvs to assist the finalization of X.ticvs � China Mobile Communications Corporation Q5/17 2015-03-19
[ 318 ]
(Rev.1-4)
First Draft of X.ticsc, Supplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE � China Mobile Communications Corporation , China Unicom Q5/17 2015-03-19
[ 289 ]
Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE � China Mobile Communications Corporation Q5/17 2014-09-03
[ 288 ]
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2014-09-03
[ 287 ]
(Rev.1)
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2014-09-03
[ 285 ]
(Rev.1)
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network � China Mobile Communications Corporation Q7/17 2014-09-03
[ 284 ]
(Rev.1)
Proposals to protect the PII data in X.gpim � China Mobile Communications Corporation Q3/17 2014-09-03
[ 283 ]
Draft X.authi: Guideline to implement the integration of service authentication with network authentication � China Mobile Communications Corporation Q10/17 2014-09-03
[ 183 ]
(Rev.1)
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks � China Mobile Communications Corporation Q6/17 2013-12-31
[ 180 ]
(Rev.1)
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2013-12-31
[ 179 ]
(Rev.1)
X.authi: Guideline to implement the authentication integration of the network layer and the service layer � China Mobile Communications Corporation , China , ZTE Corporation Q10/17 2013-12-31
[ 178 ]
(Rev.1)
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations" � China Mobile Communications Corporation Q3/17 2013-12-31
[ 156 ]
Comments on the new work item X.tfcmm � China Mobile Communications Corporation Q5/17 2013-08-15
[ 155 ]
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2013-08-15
[ 77 ]
(Rev.1)
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based networks � China Mobile Communications Corporation Q4/17 2013-04-03
[ 76 ]
(Rev.1)
Difference between the PII (personally identifiable information) in mobile telecom network and that in traditional systems � China Mobile Communications Corporation Q3/17 2013-04-03
[ 74 ]
(Rev.1)
Proposal for updating the text of sub-section into X.gpim � China Mobile Communications Corporation Q3/17 2013-04-03
[ 72 ]
(Rev.1)
Proposal text for section 8.4 "Digital right management mechanism in streaming service" in X.p2p-3 � China Mobile Communications Corporation Q7/17 2013-04-03
[ 70 ]
(Rev.1)
Sample analysis of mobile malicious software � China Mobile Communications Corporation Q6/17 2013-04-03
[ 68 ]
(Rev.1)
Proposed text of Clause 10 and bibliography in X.authi � China Mobile Communications Corporation Q10/17 2013-04-03
[ 66 ]
(Rev.1)
IdM requirements for X.idmcc chap7 � China Mobile Communications Corporation Q10/17 2013-04-03
[ 64 ]
(Rev.1)
IdM requirements for X.idmcc chap8 � China Mobile Communications Corporation Q10/17 2013-04-03
[ 63 ]
(Rev.1)
Proposed edits to X.goscc � China Mobile Communications Corporation Q8/17 2013-04-03
[ 61 ]
(Rev.1)
Comments on the latest draft of X.goscc � China Mobile Communications Corporation Q8/17 2013-04-03
[ 59 ]
(Rev.1)
Proposal of new work item: Framework of on-demand cloud security � China Mobile Communications Corporation Q8/17 2013-04-03
[ 57 ]
(Rev.1-2)
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations � China Mobile Communications Corporation Q5/17 2013-04-03
Resultados :52 documentos
Resultados :� 1 - 2 �-�Siguiente Next
Telecarga de m�ltiples documentos:�Marcar las casillas correspondientes a los documentos seleccionados, a continuaci�n pulsar "Telecargar"

Preferencias del usuario:
Telecarga de m�ltiples documentos:�Formatos e idiomas que hay que tener en cuenta (si est�n disponibles):
P�ginas de navegaci�n HTML
Formatos �+�Otros formatos
Idiomas (m�ximo 2) �+�Multiling�e �
(E: ingl�s - F: franc�s - S: espa�ol - A: �rabe - C: chino - R: ruso)

Pruebe ITU Translate, la herramienta de traducci�n autom�tica de documentos
Comienzo de la p�gina�-� Comentarios�-� Cont�ctenos�-� Copyright � UIT�2008�Reservados todos los derechos
Contacto p�blico :� TSB EDH
Actualizado el :�2025-2-3