Committed to connecting the world
ITU
General Secretariat
Radiocommunication
Standardization
About ITU-T
Events
All Groups
Standards
Resources
BSG
Study Groups
Regional Presence
Join Us
MyWorkspace
Development
ITU Telecom
Members' Zone
Join ITU
SG17 - List of Editors (Study Period 2025-2028)
You are here:
Home
>
ITU-T
>
Study Groups
>
Study Period 2025-2028
>
SG17
>
List of Editors
Share
MyWorkspace
Contact
About SG17
Mandate and lead roles
Structure
Management Team
Questions under study and Rapporteurs
Representatives and other roles
Editors
Approved deliverables
Recommendations
Technical papers
Implementers' Guides
Focus Groups
Handbooks
Selected workshops
Export:
ITEM and TITLE
EDITOR
CRAMM Roadmap
SG17 Cyber Security Reference Architectures, Models and Methodologies Strategy and Roadmap
N. KISHOR
Narang
Editor
Email:
kishor[at]narnix.com
Arnaud
Taddei
Editor
Email:
arnaud.taddei[at]broadcom.com
Security Compendium
ICT Security Compendium
Sandor
Mazgon
Editor
Email:
sandor.mazgon[at]ties.itu.int
Security standards roadmap
ICT Security standards roadmap
Yiwen
Wang
Editor
Email:
wangyiwen[at]caict.ac.cn
SG17 implementation of PP-22 Res
SG17 activities and achievements in support of the most recent Resolutions of the ITU PP
Juhee
Ki
Editor
Email:
eye[at]iitp.kr
SG17 implementation of WTDC-21 Res
SG17 activities and achievements in support of the most recent Resolutions of the WTDC
Juhee
Ki
Editor
Email:
eye[at]iitp.kr
SG17 implementation of WTSA-24 Res
SG17 activities and achievements in support of the most recent Resolutions of the WTSA
Juhee
Ki
Editor
Email:
eye[at]iitp.kr
TR.ac-pqc
Technical Report: Guidance on use of advanced cryptography based on PQC
Koji
Nakao
Editor
Email:
ko-nakao[at]nict.go.jp
TR.cs-sc
Technical Report: Collection of Security Concerns for extracting the Security Requirements for Cyber Security Reference Architecture
N. KISHOR
Narang
Editor
Email:
kishor[at]narnix.com
Jitender
Prakash
Editor
Email:
PRAKASHJIT[at]orange.itu.ch
Preetika
Singh
Editor
Email:
preetika.singh87[at]gov.in
Pushpendra Kumar
Singh
Editor
Email:
pksingh.its[at]gmail.com
TR.cs-uc
Technical Report: Use cases for extracting the security requirements for cyber security reference architecture
Daeun
Hyeon
Editor
Email:
hde0610[at]naver.com
Juhee
Ki
Editor
Email:
eye[at]iitp.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
TR.divs
Technical Report: Rationale and initial vision of a decentralized identity verification system (DIVS) based on verifiable data
Kenneth
Featherling
Editor
Email:
kmfeatherling[at]fbi.gov
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
TR.dpama
Technical Report on "Landscape analysis for data protection of avatars in metaverse applications"
Heebong
Choi
Editor
Email:
hhbchoi[at]gmail.com
Dae-Ki
Kang
Editor
Email:
dkkang[at]dongseo.ac.kr
HoonJae
LEE
Editor
Email:
hjlee[at]dongseo.ac.kr
TR.dw-lasf
Technical report: A landscape analysis and security features for a digital wallet
Xiaoyuan
Bai
Editor
Email:
xiaoyuan.bxy[at]antgroup.com
Dong Bin
Choi
Editor
Email:
dbchoi85[at]gmail.com
Xiongwei
Jia
Editor
Email:
jiaxw9[at]chinaunicom.cn
Kyeong Hee
Oh
Editor
Email:
khoh[at]tcaservices.kr
TR.fcnsc
Technical Report: Framework for cloud native based security collaboration mechanism among cloud service providers
Zhengwei
Chang
Editor
Email:
changzw[at]126.com
Lin
Chen
Editor
Email:
chenlin6[at]caict.ac.cn
Xuan
Zha
Editor
Email:
zhaxuan[at]caict.ac.cn
Linghao
Zhang
Editor
Email:
16100178[at]qq.com
TR.gscim-dlt
Technical Report: Guidelines for security consideration for incident management by DLT service provider
Yue
Chen
Editor
Email:
chenyue[at]cert.org.cn
Han
Han
Editor
Email:
hanh[at]cert.org.cn
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
Junzhi
Yan
Editor
Email:
yanjunzhi[at]chinamobile.com
Yunwei
Zhao
Editor
Email:
zhaoyunweimail[at]163.com
TR.IMT2030-sec-con
Technical Report on "Security Consideration for IMT-2030 Networks"
HaiTao
Du
Editor
Email:
duhaitao[at]chinamobile.com
Yutaka
Miyake
Editor
Email:
yu-miyake[at]kddi.com
Li
Su
Editor
Email:
suli[at]chinamobile.com
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
TR.kdc_qkdn
Technical Report: Key distribution center based approaches in the service layer to manage keys supplied by QKDN
Shen
He
Editor
Email:
heshen[at]chinamobile.com
Fuwen
Liu
Editor
Email:
liufuwen[at]chinamobile.com
Zhangchao
Ma
Editor
Email:
mazhangchao[at]qtict.com
Ye
Tian
Editor
Email:
tianye[at]chinamobile.com
Yong
Zhao
Editor
Email:
yong.zhao[at]quantum-info.com
TR.QKDN-SP
Technical Report: Overview of security profile for Quantum Key Distribution Networks in hybrid mode
Venkata Rama Raju
Chelle
Editor
Email:
cvramaraju.v[at]gov.in
Soumya
Das
Editor
Email:
soumya06.das[at]gmail.com
Prabhakar
Krishnan
Editor
Email:
kprabhakar[at]am.amrita.edu
Ravindra Pratap
Singh
Editor
Email:
rpsingh[at]prl.res.in
TR.sa-ran
Technical Report on "Security Attacks in Radio Access Networks"
Eduardo
Rodrigues
Editor
Email:
eduardorodrigues[at]anatel.gov.br
Dalton
Valadares
Editor
Email:
dalton.valadares[at]embedded.ufcg.edu.br
TR.sd-cnc
Technical report: Security guidelines for data of coordination of networking and computing
Li
Su
Editor
Email:
suli[at]chinamobile.com
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
Tingting
Yang
Editor
Email:
yangtingting[at]chinamobile.com
TR.se-ai
Technical Report: Security Evaluation on Artificial Intelligence Technology in ICT
Jia
Chen
Editor
Email:
chenjia[at]chinamobile.com
Quanchao
Liu
Editor
Email:
liuquanchao[at]chinamobile.com
Yong
Sun
Editor
Email:
sy359975[at]alibaba-inc.com
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
TR.sec-int-cpc
Technical report: Security considerations for interconnection of computing power centers
Yu
Jiang
Editor
Email:
jiangyu[at]chinatelecom.cn
Xiang
Liu
Editor
Email:
liux15[at]pcl.ac.cn
Weizhe
Zhang
Editor
Email:
weizhe.zhang[at]pcl.ac.cn
Yu
Zhang
Editor
Email:
zhuangy08[at]pcl.ac.cn
TR.sg-lmcs
Technical report: Security guidelines for DLT-based lifecycle management of computing services
Lanfang
Ren
Editor
Email:
renlanfang[at]chinamobile.com
Junzhi
Yan
Editor
Email:
yanjunzhi[at]chinamobile.com
Bo
Yang
Editor
Email:
yangbo[at]chinamobile.com
Huachun
Zhou
Editor
Email:
hchzhou[at]bjtu.edu.cn
TR.SIMRegBio
Technical Report: Guidelines for SIM Identity and Biometrics Registration
Kwadwo
Osafo-Maafo
Editor
Email:
kwadwo.osafo-maafo[at]nca.org.gh
opeolu
oyebanji
Editor
Email:
opeolu[at]ncc.gov.ng
Shamsuddeen
Sabo
Editor
Email:
ssabo[at]ncc.gov.ng
Pushpendra Kumar
Singh
Editor
Email:
pksingh.its[at]gmail.com
TR.smpa
Technical Report: Security middle platform architecture
Jingyang
Li
Editor
Email:
lijy29[at]chinatelecom.cn
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
Shuai
Wang
Editor
Email:
wangshuai8[at]chinatelecom.cn
Haodi
Zhang
Editor
Email:
zhanghaodi[at]chinatelecom.cn
TR.srsec
Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators
Gang
Du
Editor
Email:
dugang[at]cmdi.chinamobile.com
Xuetao
Du
Editor
Email:
duxuetao[at]cmdi.chinamobile.com
Chen
Zhang
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
TR.st-iot
Technical Report: Security threat scenarios in Internet of Things
Ernesto
Silveira
Editor
Email:
ernestom[at]anatel.gov.br
Dalton
Valadares
Editor
Email:
dalton.valadares[at]embedded.ufcg.edu.br
TR.Sussrev
Technical Report: Successful use of security standards
Abbie
Barbir
Editor
Email:
BarbirA[at]cvshealth.com
TR.verm
Technical Report: Framework for verification of messages
Kwadwo
Osafo-Maafo
Editor
Email:
kwadwo.osafo-maafo[at]nca.org.gh
X.5Gsec-asra
Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis
Qin
Qiu
Editor
Email:
qiuqin[at]chinamobile.com
Daoli
Su
Editor
Email:
sudl[at]chinatelecom.cn
Tian
Tian
Editor
Email:
tian.tian1[at]zte.com.cn
Jing
Wang
Editor
Email:
wang.jing17[at]zte.com.cn
X.5Gsec-FMSC
Security requirements and guidelines for fixed, mobile and satellite convergence of IMT-2020 networks and beyond
Jingpeng
Bai
Editor
Email:
baijp[at]chinatelecom.cn
Jun
Shen
Editor
Email:
shenjun6[at]chinatelecom.cn
Zecheng
Xie
Editor
Email:
xiezc18[at]chinaunicom.cn
Zhonghuai
Xie
Editor
Email:
xiezh55[at]chinaunicom.cn
X.509Amd.2
The Directory: Public-key and attribute certificate frameworks
Erik
Andersen
Editor
Email:
era[at]x500.eu
X.510 Amd.1
The Directory - Protocol specifications for secure operations
Erik
Andersen
Editor
Email:
era[at]x500.eu
Qin
Li
Editor
Email:
qin.li[at]iwncomm.com
X.1053rev
Information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations
Changoh
Kim
Editor
Email:
peterx.1053[at]gmail.com
Thaib
Mustafa
Editor
Email:
thaibmus[at]tab.com.my
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.1058rev
Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection
Changoh
Kim
Editor
Email:
peterx.1053[at]gmail.com
Jinghua
Min
Editor
Email:
minjinghua[at]cecgw.cn
Thaib
Mustafa
Editor
Email:
thaibmus[at]tab.com.my
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.1060rev
Framework for the creation and operation of a cyber defence/security centre
Arnaud
Taddei
Editor
Email:
arnaud.taddei[at]broadcom.com
Shigenori
TAKEI
Editor
Email:
takei.shigenori[at]ntt-tx.co.jp
X.1250rev
Baseline capabilities for enhanced identity management and interoperability
Abbie
Barbir
Editor
Email:
BarbirA[at]cvshealth.com
Sylvan
Tran
Editor
Email:
trans[at]aetna.com
X.1254rev
Entity authentication assurance framework
Abbie
Barbir
Editor
Email:
BarbirA[at]cvshealth.com
Sylvan
Tran
Editor
Email:
trans[at]aetna.com
X.1284
Authentication framework based on one-time authentication key using distributed ledger technology
Hun Joo
Chang
Editor
Email:
hannah[at]fnsvalue.co.kr
Seung Ju
Jeon
Editor
Email:
jkme098[at]fnsvalue.co.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.1355
Security risk analysis framework for Internet of things devices
Gunhee
Lee
Editor
Email:
icezzoco[at]gmail.com
Shinya
Sasa
Editor
Email:
shinya.sasa.ue[at]hitachi.com
X.1385
Security requirements and guidelines for telecommunications in an urban air mobility (UAM) environment
Seungwook
Park
Editor
Email:
seungwook.park[at]hyundai.com
Aram
Cho
Editor
Email:
aram[at]hyundai.com
Sang-Woo
Lee
Editor
Email:
ttomlee[at]etri.re.kr
X.1400rev
Terms and definitions for distributed ledger technology
Jae Nam
Ko
Editor
Email:
freeinlove1127[at]gmail.com
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.1456
Security guidelines for DFS applications based on USSD and STK
Vincent
Mwesigwa
Editor
Email:
vmwesigwa[at]ucc.co.ug
X.1631rev
Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services
Mark
Mcfadden
Editor
Email:
mark[at]internetpolicyadvisors.com
Nan
Meng
Editor
Email:
mengnan[at]caict.ac.cn
Koji
Nakao
Editor
Email:
ko-nakao[at]nict.go.jp
X.1648
Guideline on edge computing data security
Lu
Chen
Editor
Email:
Chenl225[at]chinaunicom.cn
Zhaoji
Lin
Editor
Email:
lin.zhaoji[at]foxmail.com
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Shuai
Wang
Editor
Email:
wangs[at]gsta.com
X.aamd-sec
Security guidelines for categorized data in advanced air mobility (AAM)
Changhun
Jung
Editor
Email:
changhun[at]hyundai.com
Sang-Woo
Lee
Editor
Email:
ttomlee[at]etri.re.kr
Yousik
Lee
Editor
Email:
yousik.lee[at]escrypt.com
Seungwook
Park
Editor
Email:
seungwook.park[at]hyundai.com
X.accsadlt
Access security authentication based on DLT
Seung Ju
Jeon
Editor
Email:
jkme098[at]fnsvalue.co.kr
Ariff Olan
Kholid
Editor
Email:
ariffolan[at]fnsvalue.co.kr
Radhilufti
Madehi
Editor
Email:
radhi[at]fnsvalue.co.kr
Norkhadhra
Nawawi
Editor
Email:
norkhadhra[at]fnsvalue.co.kr
X.af-sec
Evaluation methodologies for anonymization techniques using face images in autonomous vehicles
Sang-Woo
Lee
Editor
Email:
ttomlee[at]etri.re.kr
Yousik
Lee
Editor
Email:
yousik.lee[at]escrypt.com
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
X.arch-design
Design principles and best practices for security architectures
N. KISHOR
Narang
Editor
Email:
kishor[at]narnix.com
Arnaud
Taddei
Editor
Email:
arnaud.taddei[at]broadcom.com
X.asm-cc
Requirements of attack surface management for cloud computing
Maofei
Chen
Editor
Email:
chenmf6[at]chinatelecom.cn
Fangfang
Dai
Editor
Email:
daifangfang[at]caict.ac.cn
Dongxin
Liu
Editor
Email:
liudongxin[at]chinatelecom.cn
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
X.bvm
Requirements for biometric variability management
Jason
Kim
Editor
Email:
jasonkim_korea[at]naver.com
Eunjeong
Park
Editor
Email:
eunjeong.ej[at]gmail.com
Han
Taehwa
Editor
Email:
taehwa.han[at]gmail.com
X.cdc-csirt
Relationship between Cyber Defence/Security Center and Computer Security Incident Response Team
Arnaud
Taddei
Editor
Email:
arnaud.taddei[at]broadcom.com
X.ckrp
Framework of cryptographic key resource pool for cloud computing
Ming
He
Editor
Email:
heming8[at]chinatelecom.cn
Jun
Shen
Editor
Email:
shenjun6[at]chinatelecom.cn
Leyi
Zhang
Editor
Email:
leyi.zhang[at]zte.com.cn
X.cs-ra
Cyber security reference architecture
N. KISHOR
Narang
Editor
Email:
kishor[at]narnix.com
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Preetika
Singh
Editor
Email:
preetika.singh87[at]gov.in
Pushpendra Kumar
Singh
Editor
Email:
pksingh.its[at]gmail.com
X.dlt-ccs-fr
Security requirements and framework of cross-chain service for DLT systems
Zheng
Huang
Editor
Email:
huang.zheng2[at]zte.com.cn
Xiongwei
Jia
Editor
Email:
jiaxw9[at]chinaunicom.cn
Ziqin
Sang
Editor
Email:
zqsang[at]wri.com.cn
X.dlt-dgi
Security requirements of DLT gateway for interoperability
Jung Yeon
HWANG
Editor
Email:
jyhwang[at]sungshin.ac.kr
Xiongwei
Jia
Editor
Email:
jiaxw9[at]chinaunicom.cn
migyeong
kim
Editor
Email:
mg.kim[at]dreamsecurity.com
KIM
Youngjin
Editor
Email:
kimyngjin[at]gmail.com
X.dlt-share
Security requirements for data application software based on DLT to achieve statistics
Hang
Dong
Editor
Email:
donghang[at]chinamobile.com
Qiuli
Mei
Editor
Email:
meiqiuli2010[at]163.com
Gaoshan
ZHANG
Editor
Email:
zhanggaoshan[at]cmdi.chinamobile.com
X.dpki
Decentralized Public-key infrastructure
Erik
Andersen
Editor
Email:
era[at]x500.eu
X.dtns
Guidelines of using digital twin of network for network security
HaiTao
Du
Editor
Email:
duhaitao[at]chinamobile.com
Li
Su
Editor
Email:
suli[at]chinamobile.com
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.evpnc-sec
Security guidelines for electric vehicle plug and charge (PnC) services using vehicle identity (VID)
Byoung-Moon
Chin
Editor
Email:
bmchin[at]tta.or.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Kiho
Yeo
Editor
Email:
beware523[at]paran.com
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.fod-sec
Security guidelines for a feature on demand (FoD) service in a connected vehicle environment
Jiyong
Han
Editor
Email:
jiyong.han[at]hyundai.com
Changhun
Jung
Editor
Email:
changhun[at]hyundai.com
Seungwook
Park
Editor
Email:
seungwook.park[at]hyundai.com
X.fr-msp
Functional Requirements of Microsegmentation Platform in a cloud-based environment
Huamin
Jin
Editor
Email:
jinhm.gd[at]chinatelecom.cn
Shuai
Wang
Editor
Email:
wangshuai8[at]chinatelecom.cn
Haodi
Zhang
Editor
Email:
zhanghaodi[at]chinatelecom.cn
X.fr-vsasi
Functional requirements for visualization service of network security assets and security incidents based on digital twin
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Mengxiang
Han
Editor
Email:
hanmx12[at]chinaunicom.cn
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.gapci
Guidelines on Anti-DDoS protection for cloud infrastructure
Lin
Chen
Editor
Email:
chenlin6[at]caict.ac.cn
Hang
Dong
Editor
Email:
donghang[at]chinamobile.com
Nan
Meng
Editor
Email:
mengnan[at]caict.ac.cn
Yue
Shi
Editor
Email:
shiyue1[at]caict.ac.cn
X.gcspcc
Guidelines of developing of cybersecurity simulation platform based on cloud computing
Lu
Chen
Editor
Email:
chenl225[at]chinaunicom.cn
Wei
Liu
Editor
Email:
liuw147[at]chinaunicom.cn
Nan
Meng
Editor
Email:
mengnan[at]caict.ac.cn
Shuai
Wang
Editor
Email:
wangshuai8[at]chinatelecom.cn
Lei
Xu
Editor
Email:
xulei56[at]chinaunicom.cn
X.gdsml
Guidelines for data security using machine learning in big data infrastructure
Mi
Cao
Editor
Email:
caom11[at]chinaunicom.cn
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
Lei
Xu
Editor
Email:
xulei56[at]chinaunicom.cn
X.gnssa-iot
Guidelines of implementing network security situational awareness for IoT systems
Maofei
Chen
Editor
Email:
chenmf6[at]chinatelecom.cn
Zhaoji
Lin
Editor
Email:
lin.zhaoji[at]foxmail.com
Dongxin
Liu
Editor
Email:
liudongxin[at]chinatelecom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
X.gpmr
Guidelines and security measures for prevention and mitigation of ransomware
Mufan
Cui
Editor
Email:
cuimf[at]cert.org.cn
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Zhihui
Han
Editor
Email:
hzh[at]cert.org.cn
Minfeng
Qiu
Editor
Email:
qiuminfeng[at]chinamobile.com
Wenlei
Wang
Editor
Email:
wwl[at]cert.org.cn
X.gsm-cdc
Guidelines on Security Metrics for CDC
Hiroshi
Takechi
Editor
Email:
hiro[at]takechi.org
X.ias
Functional requirements for the integrated authentication service of telecommunication operators
Hang
Dong
Editor
Email:
donghang[at]chinamobile.com
Chen
Zhang
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
Yunfa
Zhu
Editor
Email:
19802024070[at]139.com
X.icd-schemas
Vendor agnostic security data schemas for integrated cyber defence solutions
Arnaud
Taddei
Editor
Email:
arnaud.taddei[at]broadcom.com
X.idse
Evaluation methodology for in-vehicle intrusion detection systems
Weiwei
Gong
Editor
Email:
gongweiwei[at]360.cn
Huamin
Jin
Editor
Email:
jhm[at]gsta.com;
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
Minrui
Yan
Editor
Email:
yanminrui1[at]huawei.com
Yi
Zhang
Editor
Email:
zhangyi1-s[at]360.cn
X.ig-dw
Implementation guidelines for digital watermarking
Shiqi
Li
Editor
Email:
lishiqi.li[at]alibaba-inc.com
Weiwei
Sun
Editor
Email:
sunweiwei.sww[at]alibaba-inc.com
Yong
Sun
Editor
Email:
sy359975[at]alibaba-inc.com
X.mbaas-cs-sec
Security requirements and framework of collaboration service for multiple blockchain as a service platforms
Xiongwei
Jia
Editor
Email:
jiaxw9[at]chinaunicom.cn
Keng
Li
Editor
Email:
kli[at]fiberhome.com
Yimin
Liu
Editor
Email:
liuym[at]chinaunicom.cn
Qiuli
Mei
Editor
Email:
meiqiuli2010[at]163.com
Kyeong Hee
Oh
Editor
Email:
khoh[at]tcaservices.kr
Yuwei
Wang
Editor
Email:
ywwang[at]ict.ac.cn
X.mt-feature
Security features to assess mobile terminal security
Samir
Abdelgawad
Editor
Email:
sgaber[at]tra.gov.eg
Zhiyuan
Hu
Editor
Email:
huzhiyuan[at]vivo.com
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.mt-integrity
Security guidelines for mobile terminal integrity protection
Samir
Abdelgawad
Editor
Email:
sgaber[at]tra.gov.eg
Zhiyuan
Hu
Editor
Email:
huzhiyuan[at]vivo.com
Weidong
Wang
Editor
Email:
wangweidong[at]chinawllc.com
X.nspam
Security framework for network storage protection against malware attacks
Bongchan
Kim
Editor
Email:
kbchani[at]namusoft.co.kr
Jonghyun
Kim
Editor
Email:
jhk[at]etri.re.kr
Sujung
Park
Editor
Email:
sjpark[at]tta.or.kr
Sungyong
Shin
Editor
Email:
syshin[at]filingbox.com
Jonghyun
Woo
Editor
Email:
jhwoo[at]dualauth.com
X.oicc
OpenID Connect Core 1.0 - Errata Set 2
Abbie
Barbir
Editor
Email:
BarbirA[at]cvshealth.com
X.oob-pacs
Framework for out-of-band physical access control systems using beacon-initiated mutual authentication
Il Jin
Jung
Editor
Email:
jiljin[at]estorm.co.kr
Tail
Lee
Editor
Email:
tail3831[at]estorm.co.kr
Youngjoo
Lee
Editor
Email:
yjyjoo99[at]naver.com
Sujung
Park
Editor
Email:
sjpark[at]tta.or.kr
Heejun
Shin
Editor
Email:
heejun[at]estorm.co.kr
Jonghyun
Woo
Editor
Email:
jhwoo[at]dualauth.com
X.ota-sec
Implementation and evaluation of security functions to support over-the-air (OTA) update capability in connected vehicles
Sang-Woo
Lee
Editor
Email:
ttomlee[at]etri.re.kr
Yousik
Lee
Editor
Email:
yousik.lee[at]escrypt.com
Seungwook
Park
Editor
Email:
seungwook.park[at]hyundai.com
Samuel
Woo
Editor
Email:
samuelwoo[at]dankook.ac.kr
X.pg-cla
Procedural guideline for continual learning to actively respond to network attacks
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
Jongyoul
Park
Editor
Email:
jongyoul[at]seoultech.ac.kr
X.qsdlt-ca
Guidelines for building crypto-agility and migration for quantum-safe DLT systems
Fuwen
Liu
Editor
Email:
liufuwen[at]chinamobile.com
Li
Su
Editor
Email:
suli[at]chinamobile.com
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
Weidong
Wang
Editor
Email:
wangweidong[at]chinawllc.com
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.rm-sup
Risk management on the security of software supply-chain for telecommunication organizations
Nan
Meng
Editor
Email:
mengnan[at]caict.ac.cn
Qin
Qiu
Editor
Email:
qiuqin[at]chinamobile.com
Chen
Zhang
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
X.sc-dlt
Security controls for distributed ledger technology
Kadio
Kassy
Editor
Email:
kadio.kassy[at]artci.ci
Youngjoo
Lee
Editor
Email:
yjyjoo99[at]naver.com
Keundug
Park
Editor
Email:
jacepark926[at]gmail.com
Preetika
Singh
Editor
Email:
preetika.singh87[at]gov.in
Sandeep Kumar
Vijaivergia
Editor
Email:
dirngn.tec[at]gov.in
X.scr-cna
Security requirements of sandboxed container runtime for cloud native applications
Shiqi
Li
Editor
Email:
lishiqi.li[at]alibaba-inc.com
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Linze
Wu
Editor
Email:
wulinz[at]chinatelecom.cn
Zeya
Zhu
Editor
Email:
zhuzy13[at]chinatelecom.cn
X.sc-sscti
Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry
Yuanying
Xiao
Editor
Email:
xiaoyy1[at]chinatelecom.cn
Jia
Xie
Editor
Email:
xiej68[at]chinatelecom.cn
Baoqi
Yan
Editor
Email:
yanbq[at]chinatelecom.cn
X.sec_QKD_profr
Framework of quantum key distribution (QKD) protocols in QKD network
Kaoru
Kenyoshi
Editor
Email:
kaoru.kenyoshi[at]nict.go.jp
Hao
Qin
Editor
Email:
hao.qin[at]nus.edu.sg
X.sec_QKDNi
Security requirements for Quantum Key Distribution Network interworking (QKDNi)
Dong-Hi
Sim
Editor
Email:
donghee.shim[at]sk.com
Yazi
Wang
Editor
Email:
yazi_wang[at]bupt.edu.cn
Xiaosong
Yu
Editor
Email:
xiaosongyu[at]bupt.edu.cn
Yongli
Zhao
Editor
Email:
yonglizhao[at]bupt.edu.cn
X.SecaaS
Security threats to be identified in the domain of security as a service
Ming
He
Editor
Email:
heming8[at]chinatelecom.cn
Jun
Shen
Editor
Email:
shenjun6[at]chinatelecom.cn
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.secadef
Security capabilities definitions
Arnaud
Taddei
Editor
Email:
arnaud.taddei[at]broadcom.com
Chen
Zhang
Editor
Email:
zhangchen[at]cmdi.chinamobile.com
X.sec-grp-mov
Security guideline for group movement service platform
Changoh
Kim
Editor
Email:
peterx.1053[at]gmail.com
HuyKang
Kim
Editor
Email:
cenda[at]korea.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.sf-dtea
Security framework for detecting targeted email attacks
Chunghan
Kim
Editor
Email:
KevinKim[at]kiwontech.com
Jonghyun
Kim
Editor
Email:
jhk[at]etri.re.kr
Sujung
Park
Editor
Email:
sjpark[at]tta.or.kr
Warren
Sealey
Editor
Email:
warren.sealey[at]broadcom.com
Hyunmin
Shin
Editor
Email:
hyunminshin[at]kiwontech.com
X.sfrms
Security framework and requirements of microservice for cloud computing using container technology
Jie
Liu
Editor
Email:
liujiewl[at]chinamobile.com
Wenjing
Ma
Editor
Email:
mawenjing[at]china-aii.com
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
X.sgcnp
Security guidelines for cloud native PaaS
Wei
Liu
Editor
Email:
liuw147[at]chinaunicom.cn
Nan
Meng
Editor
Email:
mengnan[at]caict.ac.cn
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
Lei
Xu
Editor
Email:
xulei56[at]chinaunicom.cn
X.sgc-rcs
Guidelines for countering spam over rich communication service (RCS) messaging
Huamin
Jin
Editor
Email:
jhm[at]gsta.com;
Shuai
Wang
Editor
Email:
wangs[at]gsta.com
Haodi
Zhang
Editor
Email:
zhanghaodi[at]chinatelecom.cn
Yanbin
Zhang
Editor
Email:
zhangyanbin[at]caict.ac.cn
X.sg-dcs
Security guidelines for DLT-based digital collection services
Jihye
Kim
Editor
Email:
ngswma32[at]naver.com
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
X.sgGenAI
Security Guidelines for Generative Artificial Intelligence Application Service
Yang
Chen
Editor
Email:
cheny1672[at]chinaunicom.cn
huifang
li
Editor
Email:
lihf209[at]chinaunicom.cn
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
X.sgmc
Security guidelines for multi-cloud
Wei
Liu
Editor
Email:
liuw147[at]chinaunicom.cn
Nan
Meng
Editor
Email:
mengnan[at]caict.ac.cn
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Lei
Xu
Editor
Email:
xulei56[at]chinaunicom.cn
Yi
Zhang
Editor
Email:
zhangyi1-s[at]360.cn
X.sgrtem
Security guidelines for real-time event monitoring and integrated management in smart city platforms
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Chang
Song
Editor
Email:
songc53[at]chinaunicom.cn
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.sgsc
Security guidelines for serverless computing
Xiaoyuan
Bai
Editor
Email:
xiaoyuan.bxy[at]antgroup.com
Yong
Feng
Editor
Email:
lujing.fy[at]alibaba-inc.com
Shiqi
Li
Editor
Email:
lishiqi.li[at]alibaba-inc.com
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
X.sg-tc
Security guidelines of trusted cloud services
Lu
Chen
Editor
Email:
chenl225[at]chinaunicom.cn
Dongxin
Liu
Editor
Email:
liudongxin[at]chinatelecom.cn
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
X.shcd
Framework for Security Human Capability Development
Lee
Hwee Hsiung
Editor
Email:
hh.lee[at]cybersecurity.my
Khairul
Kamarudin
Editor
Email:
khairul.ekhwan[at]mtsfb.org.my
Thaib
Mustafa
Editor
Email:
thaibmus[at]tab.com.my
Norkhadhra
Nawawi
Editor
Email:
norkhadhra[at]fnsvalue.co.kr
X.smdtf
Security measures for digital twin federation in smart cities and communities
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
Wenlei
Wang
Editor
Email:
wwl[at]cert.org.cn
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
Longjun
Zhao
Editor
Email:
szcskjyxgs[at]126.com
X.sm-iot
Technical requirements of security situation monitoring for Internet of things (IoT) devices
Hang
Dong
Editor
Email:
donghang[at]chinamobile.com
Xiaoqin
Huang
Editor
Email:
huangxiaoqin[at]cmiot.chinamobile.com
Lijun
Liu
Editor
Email:
liulijun[at]cmiot.chinamobile.com
Le
Yu
Editor
Email:
yule[at]chinamobile.com
shuang
zhang
Editor
Email:
zhangshuang[at]cmiot.chinamobile.com
X.soar-cc
Framework of security orchestration, automation and response for cloud computing
Maofei
Chen
Editor
Email:
chenmf6[at]chinatelecom.cn
Dongxin
Liu
Editor
Email:
liudongxin[at]chinatelecom.cn
Ye
TAO
Editor
Email:
taoy10[at]chinaunicom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
Yi
Zhang
Editor
Email:
zhangyi1-s[at]360.cn
X.so-sap
Guidelines for security orchestration of service access process
Jia
Chen
Editor
Email:
chenjia[at]chinamobile.com
Ke
Wang
Editor
Email:
wangkeyj[at]chinamobile.com
HaiYan
Zhao
Editor
Email:
zhaohaiyan[at]chinamobile.com
X.sr-ai
Security requirements for AI systems
Daeun
Hyeon
Editor
Email:
hde0610[at]naver.com
Jae Nam
Ko
Editor
Email:
freeinlove1127[at]gmail.com
Qing
Liu
Editor
Email:
liuqing6[at]chinatelecom.cn
Junhyung
Park
Editor
Email:
mintdeath[at]sch.ac.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.srapi-cc
Security requirements of application programming interface (API) for cloud computing
Maofei
Chen
Editor
Email:
chenmf6[at]chinatelecom.cn
Dongxin
Liu
Editor
Email:
liudongxin[at]chinatelecom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
X.sr-da-gai
Security threats and requirements for data annotation service of generative artificial intelligence
Zhiyuan
Hu
Editor
Email:
huzhiyuan[at]vivo.com
Luhua
Wang
Editor
Email:
wlh[at]cert.org.cn
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
Hong
Zhang
Editor
Email:
zhanghong[at]cert.org.cn
Yunwei
Zhao
Editor
Email:
zhaoyunweimail[at]163.com
X.sr-di
Security requirements for DLT-based invoices
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
Jinsue
Lee
Editor
Email:
jinsue[at]pel.sejong.ac.kr
X.srdidm
Security requirements for decentralized identity management systems using distributed ledger technology
Byoung-Moon
Chin
Editor
Email:
bmchin[at]tta.or.kr
Keundug
Park
Editor
Email:
jacepark926[at]gmail.com
Kiho
Yeo
Editor
Email:
beware523[at]paran.com
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.sr-dpts
Security requirements for DLT data on permissioned DLT-based distributed power trading systems
Lee
Haneul
Editor
Email:
hameul6789[at]gmail.com
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
Taeyang
Lee
Editor
Email:
taeyang[at]pel.sejong.ac.kr
X.sreai-ec
Security requirements of delivering edge AI on edge computing
Maofei
Chen
Editor
Email:
chenmf6[at]chinatelecom.cn
Laifu
Wang
Editor
Email:
wanglaifu[at]chinatelecom.cn
X.srgsc
Security requirements and guidelines of application and service for smart city platform
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
Jun
Shen
Editor
Email:
shenjun6[at]chinatelecom.cn
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.srgsdcs
Security requirements and guidelines of sensing and data collection system for city infrastructure
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Mengxiang
Han
Editor
Email:
hanmx12[at]chinaunicom.cn
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.sr-iiot
Security requirements for the industrial Internet of things based smart manufacturing reference model
Lee
Haneul
Editor
Email:
hameul6789[at]gmail.com
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
Jinsue
Lee
Editor
Email:
jinsue[at]pel.sejong.ac.kr
Taeyang
Lee
Editor
Email:
taeyang[at]pel.sejong.ac.kr
X.srm-fml
Security requirements and measures of federated machine learning
Jianing
Chen
Editor
Email:
chenjn[at]chinatelecom.cn
Xiongwei
Jia
Editor
Email:
jiaxw9[at]chinaunicom.cn
Qiuli
Mei
Editor
Email:
meiqiuli2010[at]163.com
X.srmpc
Security requirements for monitoring physical city assets
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
Chang
Song
Editor
Email:
songc53[at]chinaunicom.cn
Junjie
Xia
Editor
Email:
xiajj2[at]chinaunicom.cn
X.sr-smb
Security requirements for industrial IoT data of smart manufacturing using blockchain
Jong-Hyouk
LEE
Editor
Email:
jonghyouk[at]sejong.ac.kr
Haneul
Lee
Editor
Email:
haneul[at]pel.sejong.ac.kr
X.ssc-sa
Guidelines for software supply chain security audit
Lizhu
Su
Editor
Email:
sulz9[at]chinaunicom.cn
X.stie
Structured Threat Information Expression (STIE)
Michael
Rosa
Editor
Email:
mjrosa[at]cyber.nsa.gov
Duncan
Sparrell
Editor
Email:
duncan[at]sfractal.com
X.stm-dpm
Security for things across metaverses in aspects of data processing and management
Xiongwei
Jia
Editor
Email:
jiaxw9[at]chinaunicom.cn
Xiaojun
Mu
Editor
Email:
muxj[at]chinaunicom.cn
Junhyung
Park
Editor
Email:
mintdeath[at]sch.ac.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.str-irs
Security threats and requirements for information recommendation service
Zhiyuan
Hu
Editor
Email:
huzhiyuan[at]vivo.com
Junzhi
Yan
Editor
Email:
yanjunzhi[at]chinamobile.com
Yunwei
Zhao
Editor
Email:
zhaoyunweimail[at]163.com
X.st-ssc
Security threats of software supply chain
Da Eun
Hyeon
Editor
Email:
chlrhekdms0610[at]sch.ac.kr
Jae Nam
Ko
Editor
Email:
freeinlove1127[at]gmail.com
Junhyung
Park
Editor
Email:
mintdeath[at]sch.ac.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.sup-cdc
Supplement to X.1060: X.1060 Tutorial material
Hiroshi
Takechi
Editor
Email:
hiro[at]takechi.org
Shigenori
TAKEI
Editor
Email:
takei.shigenori[at]ntt-tx.co.jp
X.sup-tig-iotsec
Technical implementation guidelines for IoT devices and gateway
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Jyoti
Sengar
Editor
Email:
jyoti.sengar[at]gov.in
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.taeii
Trusted Automated Exchange of Intelligence Information (TAEII)
Michael
Rosa
Editor
Email:
mjrosa[at]cyber.nsa.gov
Duncan
Sparrell
Editor
Email:
duncan[at]sfractal.com
X.tas
Telebiometric authentication using speaker recognition
Myung Geun
Chun
Editor
Email:
mgchun[at]chungbuk.ac.kr
Fatoumata
SAMAKE
Editor
Email:
f.samake[at]sotelma.ml
X.tc-ifd
Technical capabilities of interactive fraud detection
Bibo
Liu
Editor
Email:
lubibo.lbb[at]alibaba-inc.com
Jae Hoon
Nah
Editor
Email:
jhnah[at]etri.re.kr
Jin
Peng
Editor
Email:
jim.pj[at]antgroup.com
X.tg-fdma
Technical guidelines for fraud detection of malicious applications in mobile devices
Xiaoyuan
Bai
Editor
Email:
xiaoyuan.bxy[at]antgroup.com
Zhiyuan
Hu
Editor
Email:
huzhiyuan[at]vivo.com
Hazirah
Md Nawi
Editor
Email:
hazirah[at]mcmc.gov.my
Jin
Peng
Editor
Email:
jim.pj[at]antgroup.com
Weidong
Wang
Editor
Email:
wangweidong[at]chinawllc.com
Wenbiao
Zhao
Editor
Email:
wenbiao.zwb[at]antgroup.com
X.tis
Telebiometric authentication based on information splitting
Myung Geun
Chun
Editor
Email:
mgchun[at]chungbuk.ac.kr
X.vctp
Verifiable credential-based trust propagation framework in the decentralized identity
Abbie
Barbir
Editor
Email:
BarbirA[at]cvshealth.com
Kenneth
Featherling
Editor
Email:
kmfeatherling[at]fbi.gov
Junhyung
Park
Editor
Email:
mintdeath[at]sch.ac.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
X.vide
Guideline of visual feature protection and secure sharing mechanisms for de-identification
Feng
Gao
Editor
Email:
gaofeng149[at]chinaunicom.cn
Youngjoo
Jo
Editor
Email:
run.youngjoo[at]etri.re.kr
Jongyoul
Park
Editor
Email:
jongyoul[at]seoultech.ac.kr
X.ztmc
Guidelines for Hhigh level Zero trust model and its security capabilities for in telecommunication networks
Junhyung
Park
Editor
Email:
mintdeath[at]sch.ac.kr
Sungchae
Park
Editor
Email:
zoesc.park[at]sch.ac.kr
Heung Youl
Youm
Editor
Email:
hyyoum[at]sch.ac.kr
Export:
Follow us
Twitter
Facebook
YouTube
Flickr
Linkedin
Instagram
Soundcloud
Podcasts
Spotify
Spreaker
TikTok