Contributions
�[�Source:�ZTE�]��� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 267 ]
�
(Rev.1)� |
A proposal on studying security requirements and framework of cloud based telecommunication service environment
�
� |
ZTE Corporation, CATR, MIIT
� |
Q8/17
� |
2010-03-26 |
|
[ 266 ]
�
� |
User authentication mechanism of X.p2p-3
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 264 ]
�
� |
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
�
� |
China Mobile, China MII, ZTE
� |
Q7/17
� |
2010-03-26 |
|
[ 261 ]
�
� |
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
|
[ 256 ]
�
(Rev.1)� |
Proposed mechanisms on inter-federation trust establishment for X.giim
�
� |
ZTE Corporation
� |
Q10/17
� |
2010-03-26 |
|
[ 252 ]
�
� |
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
China Mobile, ZTE
� |
Q4/17
� |
2010-03-26 |
|
[ 251 ]
�
� |
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
�
� |
ZTE, China Mobile
� |
Q4/17
� |
2010-03-26 |
|
[ 242 ]
�
� |
An analysis of X.authi: Authentication integration between the network and service layers
�
� |
China Mobile, China MII, ZTE
� |
Q10/17
� |
2010-03-26 |
Resultats:8 documents
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):