Contributions�� |
�
|
Num�ro�
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 226 ]
�
� |
Proposals on Cloud Security Components
�
� |
Microsoft Corporation
� |
Q8/17
� |
2014-01-06 |
|
[ 225 ]
�
� |
Proposals for x.fsspvn
�
� |
Microsoft Corporation
� |
Q8/17
� |
2014-01-06 |
|
[ 224 ]
�
� |
Proposed revision of Draft X.mgv6 (Security management guideline for implementation of IPv6 environment in telecommunications organizations) - Supplement of X.1037
�
� |
KDDI Corporation, National Institute of Information and Communications Technology
� |
Q3/17, Q2/17
� |
2014-01-02 |
|
[ 223 ]
�
� |
Threats analysis for ITS communications - Initial study
�
� |
KDDI Corporation, National Institute of Information and Communications Technology
� |
Q6/17
� |
2014-01-02 |
|
[ 222 ]
�
� |
Proposal of new work item - Guidelines for Personal Information Protection in Cloud Computing
�
� |
China
� |
Q8/17
� |
2014-01-02 |
|
[ 221 ]
�
� |
Comparison of new work item and X.atag
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17, Q10/17
� |
2014-01-02 |
|
[ 220 ]
�
(Rev.1)� |
Inputs and discussion for TD 0659 X. ticvs
�
� |
India
,
Ministry of Communications and Information Technology
� |
Q5/17
� |
2014-01-02 |
|
[ 219 ]
�
� |
Proposal for a new work item on guidelines for using object identifiers (OID) for the Internet of Things
�
� |
China Telecommunications Corporation
,
China Unicom
,
Ministry of Industry and Information Technology (MIIT)
,
ZTE Corporation
� |
Q11/17
� |
2014-01-02 |
|
[ 218 ]
�
(Rev.1)� |
Q3 Roadmap update
�
� |
LAC CO. Ltd
� |
Q3/17
� |
2014-01-02 |
|
[ 217 ]
�
� |
�
Withdrawn
� |
N/A
� |
N/A
� |
2014-01-02 |
|
[ 216 ]
�
(Rev.1)� |
Firth draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices
�
� |
Korea (Rep. of)
� |
Q9/17
� |
2014-01-02 |
|
[ 215 ]
�
(Rev.1)� |
Firth draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices
�
� |
Korea (Rep. of)
� |
Q9/17
� |
2014-01-02 |
|
[ 214 ]
�
(Rev.1)� |
Proposal of studying the security guidelines for the V2X communication system
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2014-01-02 |
|
[ 213 ]
�
(Rev.1)� |
Proposal of the 3rd draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on ITU-T X.813
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-01-02 |
|
[ 212 ]
�
� |
Security implication on Software-Defined Networking (SDN)
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q6/17
� |
2014-01-02 |
|
[ 211 ]
�
(Rev.1)� |
A proposal for the telecommunication specific implementation guidance text for newly introduced controls on 2nd draft text for Recommendation ITU-T X.1051-rev
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2014-01-02 |
|
[ 210 ]
�
(Rev.1)� |
Proposed revised text on draft Recommendation ITU-T X.msec-8: Secure application distribution framework for communication devices
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2014-01-02 |
|
[ 209 ]
�
(Rev.1)� |
Proposal for modifications of X.sgsec-1 : Security functional architecture for smart grid services using the telecommunication network
�
� |
Korea (Rep. of)
� |
Q6/17
� |
2014-01-02 |
|
[ 208 ]
�
(Rev.1-2)� |
Proposal for supplement to X.1144 - Enhancements and new features in XACML 3.0
�
� |
Korea (Rep. of)
� |
Q7/17, Q10/17
� |
2014-01-02 |
|
[ 207 ]
�
(Rev.1)� |
A proposal for the final revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source-based security troubleshooting mechanisms for Internet protocol-based networks
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2014-01-02 |
|
[ 206 ]
�
(Rev.1)� |
A proposal for the 3rd revised text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-01-02 |
|
[ 205 ]
�
(Rev.1)� |
A proposal for the 4th revised text for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
�
� |
Korea (Rep. of)
� |
Q3/17
� |
2014-01-02 |
|
[ 204 ]
�
(Rev.1)� |
A proposal for the 9th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
�
� |
Korea (Rep. of)
� |
Q4/17
� |
2014-01-02 |
|
[ 203 ]
�
(Rev.1)� |
Basic principles to study new security issues (e.g. security for ITS and SDN)
�
� |
Korea (Rep. of)
� |
Q6/17, Q2/17
� |
2014-01-02 |
|
[ 202 ]
�
(Rev.1)� |
A proposal for clause 7 and 8 in X.sap-8:Efficient multi-factor authentication mechanisms using mobile devices
�
� |
Korea (Rep. of)
� |
Q7/17
� |
2014-01-02 |
|
[ 201 ]
�
� |
Proposed modifications to draft X.1051-rev, "Information security management guidelines for telecommunications organizations based on ISO/IEC 27002"
�
� |
KDDI Corporation
� |
Q3/17
� |
2014-01-02 |
|
[ 200 ]
�
(Rev.1)� |
Final text of draft Recommendation ITU-T X.websec-5: Security framework for web mashup services (for agreement)
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2014-01-01 |
|
[ 199 ]
�
(Rev.1)� |
Proposal for a new clause about testing and evaluation to X.msec-8
�
� |
Ministry of Industry and Information Technology (MIIT)
� |
Q6/17
� |
2014-01-01 |
|
[ 198 ]
�
(Rev.1-2)� |
Proposal for a new work item: Security Guidelines for Virtual Network Operator (VNO)
�
� |
Beijing University of Posts and Telecommunications
,
China Telecommunications Corporation
,
Ministry of Industry and Information Technology (MIIT)
� |
Q2/17
� |
2014-01-01 |
|
[ 197 ]
�
(Rev.1)� |
Draft of Survey Questionnaire on Countering Spam
�
� |
Ministry of Industry and Information Technology (MIIT)
� |
Q5/17
� |
2014-01-01 |
|
[ 196 ]
�
(Rev.1)� |
Proposal for add Section 5.4, the description of "individual information service" in X.gsiiso
�
� |
China Unicom
� |
Q2/17
� |
2013-12-31 |
|
[ 195 ]
�
(Rev.1)� |
Proposal for X.goscc: Add content for Section 8.6
�
� |
China Unicom
� |
Q8/17
� |
2013-12-31 |
|
[ 194 ]
�
(Rev.1)� |
Proposal for X.goscc: Add content for Section 8.4
�
� |
China Unicom
� |
Q8/17
� |
2013-12-31 |
|
[ 193 ]
�
(Rev.1)� |
Proposal for a new work item: Guideline for virtualization security in cloud
�
� |
China
,
China Unicom
,
ZTE Corporation
� |
Q8/17
� |
2013-12-31 |
|
[ 192 ]
�
(Rev.1)� |
Proposal for update Section 10 of X.tfcmm
�
� |
China Unicom
� |
Q5/17
� |
2013-12-31 |
|
[ 191 ]
�
(Rev.1)� |
Proposal for update Section 9 of X.tfcmm
�
� |
China Unicom
� |
Q5/17
� |
2013-12-31 |
|
[ 190 ]
�
(Rev.1)� |
Proposal for X.unsec-1: draft for consent
�
� |
China Unicom
,
ZTE Corporation
� |
Q6/17
� |
2013-12-31 |
|
[ 189 ]
�
(Rev.1)� |
Proposal for a new work item on "The security requirement framework for smartphones-based botnet"
�
� |
China Unicom
� |
Q4/17
� |
2013-12-31 |
|
[ 188 ]
�
(Rev.1)� |
Proposed text for configuration management of X.goscc
�
� |
China Telecommunications Corporation
,
China
� |
Q8/17
� |
2013-12-31 |
|
[ 187 ]
�
(Rev.1)� |
Proposed text for security monitoring of X.goscc
�
� |
China Telecommunications Corporation
,
China
� |
Q8/17
� |
2013-12-31 |
|
[ 186 ]
�
(Rev.1)� |
Proposed revised text for the scope of X.goscc
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2013-12-31 |
|
[ 185 ]
�
(Rev.1)� |
Proposed new work item on Technical Requirements for Countering Instant Messaging Spam
�
� |
China Telecommunications Corporation
,
China
,
ZTE Corporation
� |
Q5/17
� |
2013-12-31 |
|
[ 184 ]
�
(Rev.1)� |
Proposed security requirements for X.sfcse
�
� |
China Telecommunications Corporation
� |
Q8/17
� |
2013-12-31 |
|
[ 183 ]
�
(Rev.1)� |
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
�
� |
China Mobile Communications Corporation
� |
Q6/17
� |
2013-12-31 |
|
[ 182 ]
�
(Rev.1)� |
ITU-T x.orf: A proposal for modification of scenarios in Clause 9
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q11/17
� |
2013-12-31 |
|
[ 181 ]
�
(Rev.1)� |
ITU-T x.orf: A proposal for modification of requirements in Clause 8
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q11/17
� |
2013-12-31 |
|
[ 180 ]
�
(Rev.1)� |
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
�
� |
China Mobile Communications Corporation
� |
Q5/17
� |
2013-12-31 |
|
[ 179 ]
�
(Rev.1)� |
X.authi: Guideline to implement the authentication integration of the network layer and the service layer
�
� |
China Mobile Communications Corporation
,
China
,
ZTE Corporation
� |
Q10/17
� |
2013-12-31 |
|
[ 178 ]
�
(Rev.1)� |
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"
�
� |
China Mobile Communications Corporation
� |
Q3/17
� |
2013-12-31 |
|
[ 177 ]
�
(Rev.1-3)� |
A proposal of new work item : reference monitor for online analytics applications
�
� |
Electronics and Telecommunications Research Institute (ETRI)
� |
Q7/17
� |
2013-12-31 |
Resultats:69 documents R�sultats :�
1 -
2
�-�Suivant
� |
T�l�chargement de multiples documents:�Formats et langues � prendre en compte (si disponibles):