Committed to connecting the world

WTISD

Mar24-summary

​​Executive Summary

Meeting of ITU-T SG17 'Security', Geneva, 20 February – 1 March 2024

Hot topics of this meeting (summarizing both input & output)

  • AI/ML security
  • Digital twin and metaverse
  • Quantum based security, Post Quantum Cryptography
  • 5G security
  • Cloud security
  • Cybersecurity, Cyber defence, Zero Trust, countering spam, prevention from cyber attack
  • IoT security
  • Software supply chain security
  • Data protection

1        Meeting Output (meeting statistics see Annex E below)

  • Output standards (22, see Annex A):
    • TAP approval (5): Details are in Annex A a).
    • TAP not approved (3): Details are in Annex A b).
    • TAP determined (8): 8 new Recommendations. Details are in Annex A c).
    • AAP consented (6): 4 new and 1 revised Recommendations, and 1 Amendment for AAP Last Call. Details are in Annex A d).
    • Agreed (3): 1 new Supplement, 1 revised Technical Paper and 1 new Technical Report. Details are in Annex A e).
  • New work items (54, see Annex C).
  • OID registration authority for Republic of Haiti: {joint-iso-itu-t(2) country(16) ht(332)}
  • ITU-T Workshop on Generative AI: Challenges and Opportunities for Security and Privacy on 19 February 2024 and ITU-T SG17 Mini-Workshop on ITU-T X.1060 Cyber Defence Center on 22 Feb 2024 were both well attended (270+/60+ participants)
  • SG17 Mandate, scope and Question text for next study period reviewed.
  • Tutorials on using tools to support standardization, new BSG program and digital rights were well appreciated.
  • Delegates from Africa and Arab States gathered for preparation of SG17RG meetings and WTSA-24
  • SG17 subgroups (JCAs and Correspondence Groups)
    • JCA-IdM 33rd meeting on Friday 1 Sep 2023
    • JCA-COP: remain as dormant.
      • CG-SG17-wtsa24-prep: continued
      • CG-secapa (Correspondence Group on Security Capability and Architecture): continued
      • CG-COP (Child online protection): newly established, ToR in TD1811.
      • CG-AIsec (Correspondence group on AI security): newly established, ToR in TD1949.

2        Next SG17 meetings

2.1        3rd virtual “ITU-T X.509 Day" event, 9 May 2024, focus on quantum challenges to PKI

2.2       2nd SG17 meeting in 2024

  • 48 Candidate texts for action, details see Annex B.

Option 1: 2-week physical meeting outside Geneva, June/July 2024

If member state invites before 15th March 2024, a physical SG17 meeting with remote participation will take place in June/July 2024 for nine working days, preceded by a one-day ITU Workshop on security and privacy for digital twin and metaverse.

Option 2: 2-day e-plenary in July + 1-week physical meeting in September

  1. A two-day SG17 e-plenary, 11-12 July, 4-6 hours/day, to complete SG17 preparation for next study period
  • One-week physical SG17 meeting with remote participation, Geneva, 2-6 September 2024, no workshop; Open and extended management team meeting on Sunday 1 Sept, 16:00-18:00.

2.3       Interim RGMs

8 Questions plan to hold the following 11 RGMs before next SG17 meeting:

#
QDatePlace/HostSubject/objective
1.                 1/1717 May 2024Seoul, Korea (Republic of) (physical with remote participation)/ Soonhunhyang University

- review the draft 8th edition of Security Manual

- review the draft 3rd edition of TR-Suss

- review all work items and identify future topics for Q1/17

2.                 3/17 5 June, 2024
(10:00-12:00 CEST)
MyWorkspace
  • X.shcd
3.                 3/176 June, 2024
(10:00-12:00 CEST)
MyWorkspace
  • X.1058-rev, X.1053-rev
4.                 3/1711-12 June, 2024
(10:00-12:00 CEST)
MyWorkspace
  • Sup-cdc, X.gsm-cdc, X.1060-rev
5.                 4/1724 May 2024, tbcMyWorkspace
  • progress all the work of Q4/17
6.                 7/1721-22 May 2024Hangzhou China (physical with remote participation) / Ant Group
  • All the work of Q7/17
7.                 8/1721-22 May 2024Hangzhou China (physical with remote participation) / Ant Group
  • All the work of Q8/17
8.                 10/17One day between 16-27 May 2024TBD
  • progress all the work of Q10/17
9.                 13/174 ~ 5 June 2024e-meeting
  • Prepare the final texts for X.evtol-sec and X.sup-cv2x-sec
  • Question text
10.              15/1711am-1pm on 4 & 6 June 2024e-meeting
  • Proposed new WIs and on-going WIs in incubation
11.              15/17TBD July 2024e-meeting
  • Proposed new WIs and on-going WIs on QKD


Annex A
Actions taken on Recommendations, and other texts at SG17 closing plenary on 1 March 2024

a)    TAP Recommendations approved (WTSA-20 Resolution 1)

#QAcronymTitleNew / RevisedEditor(s)Location of textA.5 or A.25 justificationEquivalent
e.g., ISO/IEC
1.       6/17Amendment of X.1352Amendment of X.1352: Security requirements for Internet of things devices and gatewaysRevHeung Youl YOUMTD1771--
2.       7/17X.1150
(X.saf-dfs)
Security assurance framework for digital financial servicesNewJacques FRANCOEUR,
Jun Hyung PARK, Sungchae PARK, Heung Youl YOUM
TD1772  
3.       10/17X.1280
(X.oob-sa)
Framework for out-of-band server authentication using mobile devicesNewIl Jin JUNG,
Sujung PARK, Heejun SHIN, Jonghyun WOO
R51  
4.       10/17X.1281
(X.osia)
Open Standard Identity APIs (OSIA) specification version 6.1.0NewAbbie BarbirTD1887TD1298OSIA 6.1.0
5.       13/17X.1373revSecure software update capability for intelligent transportation system communication devicesRevAram CHO,
Sang-Woo LEE,
Koji NAKAO, Seungwook PARK
TD1806  
  1. b)    TAP Recommendations not approved (WTSA-20 Resolution 1)
  2. TAP approval of updated texts (as identified in TDs below) are deferred to next SG17 physical meeting

#QAcronymTitleNew / RevisedEditor(s)Location of TextEquivalent
e.g., ISO/IEC
Start of work​Determined
1         2/17X.1818
(X.5Gsec-ctrl)
Security controls for operation and maintenance of IMT-2020 network systemsNewAyumu KUBOTA,
Koji NAKAO, Yutaka MIYAKE
TD1827 2022-082023-09
2         4/17X.1221
(X.stie)
Structured threat information expressionNewMichael ROSA, Duncan SPARRELLTD1823OASIS STIX Version 2.12022-082023-09
3         4/17X.1222
(X.taeii)
Trusted automated exchange of intelligence informationNewMichael ROSA, Duncan SPARRELLTD1824OASIS TAXII Version 2.12022-082023-09

c)     TAP Recommendations determined (WTSA-20 Resolution 1)

#QAcronymTitleNew / RevisedEditor(s)Location of TextA.5 or A.25 justificationEquivalent
e.g., ISO/IEC
1         2/17X.1819
(X.5Gsec-netec)
Security capabilities of network layer for IMT-2020/5G edge computingNewYifu WANG,
Chen ZHANG,
Bei ZHAO
TD1854--
2         2/17X.1820
(X.5Gsec-srocvs)
Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical ServicesNewFeng GAO,
Ming HE,
Guorong LIU,
Jun SHEN
TD1794TD1739 
3         4/17X.1237 (X.tsfpp)Technical security framework for personal identifiable information protection while countering mobile messaging spamNewFeng GAO,
Wei LIU, 
Junjie XIA,
Bo YU,
Chen ZHANG, Yanbin ZHANG
TD1804  
4         6/17X.1354
(X.sc-iot)
Security controls for IoT systemsNewLijun LIU,
Koji NAKAO
TD1875  
5         6/17X.1353
(X.ztd-iot) Note 1
Security Methodology Framework based on Blockchain for Zero-Touch Deployment in Massive IoTNewXin KANG, Haiguang WANG, Weidong WANGTD1850  
6         7/17X.1471 (X.websec-7) Note 2Reference monitor for online analytics servicesNewHyungjin LIM,
Jae Hoon NAH, Jongyoul PARK, Junjie XIA
TD1790  
7         10/17X.1283 (X.gpwd)Threat Analysis and guidelines for securing password and password-less authentication solutionsNewAbbie BARBIRTD1897  
8         13/17X.1384 (X.itssec-5)Security guidelines for vehicular edge computingNewSang-Woo LEETD1807  

Note 1:  TAP determined at SG17 Aug/Sep 2022 meeting, TAP re-determined at SG17 Feb/Mar 2023 meeting, TAP approval deferred by SG17 Aug/Sep 2023 meeting, TAP re-determined again in this SG17 Feb/Mar 2024 meeting.

Note 2: TAP determined at SG17 Feb/Mar 2023 meeting, TAP approval deferred by SG17 Aug/Sep 2023 meeting, TAP re-determined in this SG17 Feb/Mar 2024 meeting.

d)    AAP Recommendations consented (Recommendation ITU-T A.8)

 #Q/17AcronymTitleNew/RevEditor(s)TextA.5 or A.25 justificationEquivalent
e.g., ISO/IEC
1         7/17X.1144revThe revision of eXtensible Access Control Markup Language (XACML) 3.1RevJae Hoon NAH,
Duncan SPARRELL
TD1846 XACML 3.1
2         7/17X.1771
(X.guide-cdd)
Security guidelines for combining de-identified data using trusted third partyNewHeung Youl YOUM, Sungchae PARK,
Jae Nam KO
TD1796  
3         7/17X.2011
(X.sg-dtn)
Security Guidelines for Digital Twin NetworkNewMeiling CHEN,
Jing SHAO,
Li SU,
Ke WANG
TD1792  
4         7/17X.1455
(X.smsrc)
Security Measures for Smart Residential CommunityNewFeng GAO,
Jae Hoon NAH,
Junjie XIA,
Longjun ZHAO,
Feng ZHANG
TD1926  
5         15/17X.1713
(X.sec-QKDN_tn)
Security requirements for the protection of quantum key distribution nodeNewQiang HUANG,
Minghan LI,
Jiajun MA,
Hao QIN
TD1817  
6         15/17X.1715AmdSecurity requirements and measures for integration of quantum key distribution network and secure storage networkNewKaoru KENYOSHITD1816  

 

e)     Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) agreed

 ​#Q/17AcronymTitleNew / RevEditor(s)Text

 1.


1/17TP.inno-2.0Technical Paper: Description of the incubation mechanism and ways to improve it
RevArnaud TADDEITD1874

2. 


2/17TR.zt-acpGuidelines for zero trust based access control platform in telecommunication network
NewJing HUANG,
Wei LIU,
Xu WANG,
Junzhi YAN,
Heung Youl YOUM
TD1838

 3.


7/17X.suppl.uc-dccSupplement to X.1152: Use cases for digital COVID-19 certificates
NewDaeun HYEON,
Sungchae PARK,
Heung Youl YOUM
TD1798


Annex B
Recommendations planned for action in 2nd SG17 meeting in 2024

1                 TAP Recommendations planned for TAP approval (WTSA-20 Resolution 1)

#QAcronymTitleNew / RevisedEditor(s)Location of TextA.5 or A.25 justificationEquivalent
e.g., ISO/IEC
1         2/17X.1818
(X.5Gsec-ctrl) Note 3
Security controls for operation and maintenance of IMT-2020 network systemsNewAyumu KUBOTA,
Koji NAKAO, Yutaka MIYAKE
TD1827  
2         2/17X.1819
(X.5Gsec-netec)
Security capabilities of network layer for IMT-2020/5G edge computingNew

Yifu WANG,
Chen ZHANG,
Bei ZHAO

TD1854--
3         2/17X.1820
(X.5Gsec-srocvs)
Security Requirements for the Operation of IMT-2020/5G Core Network to Support Vertical ServicesNew

Feng GAO,
Ming HE,
Guorong LIU,
Jun SHEN

TD1794TD1739 
4         4/17X.1221 (X.stie) Note 3Structured threat information expressionNewMichael ROSA, Duncan SPARRELLTD1823 OASIS STIX Version 2.1
5         4/17X.1222 (X.taeii) Note 3Trusted automated exchange of intelligence informationNewMichael ROSA, Duncan SPARRELLTD1824 OASIS TAXII Version 2.1
6         4/17X.1237 (X.tsfpp)Technical security framework for personal identifiable information protection while countering mobile messaging spamNewFeng GAO,
Wei LIU, 
Junjie XIA,
Bo YU,
Chen ZHANG, Yanbin ZHANG
TD1804  
7         6/17X.1354 (X.sc-iot)Security controls for IoT systemsNewLijun LIU,
Koji NAKAO
TD1875  
8         6/17X.1353 (X.ztd-iot) Note 1Security Methodology Framework based on Blockchain for Zero-Touch Deployment in Massive IoTNewXin KANG, Haiguang WANG, Weidong WANGTD1850  
9         7/17X.1471 (X.websec-7) Note 2Reference monitor for online analytics servicesNewHyungjin LIM,
Jae Hoon NAH, Jongyoul PARK, Junjie XIA
TD1790  
10      10/17X.1283 (X.gpwd)Threat Analysis and guidelines for securing password and password-less authentication solutionsNewAbbie BARBIRTD1897  
11      13/17X.1384 (X.itssec-5)Security guidelines for vehicular edge computingNewSang-Woo LEETD1807  

Note 3: TAP approval deferred by SG17 Feb/Mar 2024 meeting.

2                 TAP Recommendations planned for TAP determination (WTSA-20 Resolution 1)

#QAcronymTitleNew / RevisedEditor(s)Location of TextEquivalent
e.g., ISO/IEC
1         4/17X.sgc-rcsGuidelines for countering spam over RCS messagingNewHuamin JIN,
Shuai WANG,
Haodi ZHANG, Yanbin ZHANG
TD1358 
2         6/17X.ra-iotSecurity risk analysis framework for IoT devicesNewGunhee LEE,
Shinya SASA
TD1882 
3         7/17X.sgdfs-usSecurity guidelines for DFS applications based on USSD and STKNewVincent MWESIGWATD1973 
4         8/17X.gdsmlGuidelines for data security using machine learning in big data infrastructureNewMi CAO,
Ye TAO,
Laifu WANG,
Lei XU
TD1845 
5         8/17X.gecdsGuideline on edge computing data securityNewLu CHEN,
Zhaoji LIN,
Ye TAO,
Shuai WANG
TD1857 
6         8/17X.sgcnpSecurity guidelines for cloud native PaaSNewWei LIU,
Nan MENG,
Ye TAO,
Laifu WANG,
Lei XU
TD1810 
7         8/17X.sgmcSecurity guidelines for multi-cloudNewWei LIU,
Nan MENG,
Ye TAO,
Lei XU,
Yi ZHANG
TD1809 
8         8/17X.soar-ccFramework of Security Orchestration, Automation and Response for cloud computingNewMaofei CHEN, Dongxin LIU,
Ye TAO,
 Laifu WANG,
Yi ZHANG
TD1872 
9         10/17X.1250revBaseline capabilities for enhanced identity management and interoperabilityRevAbbie BARBIRTD1945 
10      13/17X.evtol-secSecurity requirements and guidelines for telecommunications in an urban air mobility (UAM) environmentNew

Aram CHO,
Sang-Woo LEE,
Seungwook PARK

TD1866 ​

3                 AAP Recommendations planned for AAP consent (Recommendation ITU-T A.8)

#​QAcronymTitleNew / RevisedEditor(s)Location of TextEquivalent
e.g., ISO/IEC
1         7/17X.smdtscSecurity Measures for Digital Twin System of Smart CitiesNewFeng GAO,
Jae Hoon NAH,
Junjie XIA,
Feng ZHANG,
Longjun ZHAO
TD1961 
2         8/17X.sa-ecSecurity architecture of edge cloudNewHuamin JIN,
Zhaoji LIN,
Ye TAO,
Shuai WANG,
Haodi ZHANG
TD1873 
3         8/17X.sg-scmrSecurity guidelines for selecting computing methods and resources from Cloud Service ProvidersNewHuizheng GENG,
Li LU,
Nan MENG,
Ke WANG
TD1946 
4         10/17X.tasTelebiometric authentication using speaker recognition Fatoumata SAMAKE,
Myung Geun CHUN
TD1892 
5         11/17X.508
(X.pki-em)
Public-key infrastructure: Establishment and maintenanceNewErik ANDERSENTD1290ISO/IEC 9594-12
6         11/17X.500Amd.1The Directory: Overview of concepts, models and servicesRevErik ANDERSENTD1913

ISO/IEC 9594-1
7         11/17X.501Amd.2The Directory: ModelsRev Erik ANDERSENTD1914ISO/IEC 9594-2
8         11/17X.509Amd.1The Directory: Public-key and attribute certificate frameworksRevErik ANDERSEN,
Qin LI
TD1919ISO/IEC 9594-8
9         11/17X.510Amd.1The Directory - Protocol specifications for secure operations  RevErik ANDERSEN,
Qin LI
TD1921ISO/IEC 9594-11
10      11/17X.511Amd.1The Directory: Abstract service definitionRevErik ANDERSENTD1915ISO/IEC 9594-2
11      11/17X.518Amd.1The Directory: Procedures for distributed operationRev Erik ANDERSENTD1916ISO/IEC 9594-4
12      11/17X.519Amd.1The Directory: Protocol specifications  RevErik ANDERSENTD1917ISO/IEC 9594-5
13      11/17X.520Amd.1The Directory: Selected attribute typesRevErik ANDERSENTD1918ISO/IEC 9594-6
14      11/17X.521Amd.1The Directory: Selected object classesRevErik ANDERSENTD1922ISO/IEC 9594-7
15      11/17X.525Amd.1The Directory: ReplicationRevErik ANDERSENTD1920ISO/IEC 9594-9
16      14/17X.sc-dltSecurity controls for distributed ledger technology Kadio KASSY, Youngjoo LEE, Kyeong Hee OH, Keundug PARK, Preetika SINGH, Sandeep Kumar VIJAIVERGIA TD1835 
17      15/17X.sec_QKDN_AAAuthentication and authorization in QKDN using quantum safe cryptographyNewKaoru KENYOSHI, Kazunori TANIKAWATD1899 
18      15/17X.sec_QKDN_CMSecurity requirements and measures for quantum key distribution networks – control and managementNewTaesang CHOI, Hyungsoo KIM, Matthieu LEGRÉ, Kazunori TANIKAWA,
Chun Seok YOON
TD1900 
19      15/17X.secadefSecurity capabilities definitionsNewArnaud TADDEI,
Chen ZHANG
TD2013 

4                 Non-normative texts (Technical Report, Supplement, Implementers' Guide, etc) planned for agreement

 #
Q/17AcronymTitleNew / RevisedEditor(s)Location of textEquivalent
e.g., ISO/IEC
1       1/17TR.sec-manualTechnical Report: 8th edition of Security ManualRevKyeong Hee OH TD3104
 
2       1/17TR.SussTechnical Report: 3rd edition of Technical Report: Successful use of security standardsRevAbbie BARBIRTD1040
 
3       2/17TR.5Gsec-bsfTechnical Report: Guidelines of built-in security framework for the telecommunications networkNewXiaoting HUANG,
Li SU,
Ke WANG
TD1975 
4       10/17X.sup-ekyc-dfsSupplement to ITU-T X.1254: e-KYC use cases in digital financial servicesNewDaeun HYEON,
Sungchae PARK,
Heung Youl YOUM
TD1956 
5       10/17X.sup-sat-dfsSupplement to ITU-T X.1254: Implementation of secure authentication technologies for digital financial servicesNewJunhyung PARK,
Sungchae PARK,
Heung Youl YOUM
TD1944 
6       13/17X.sup-cv2x-secSupplement to X.1813 – Security deployment scenarios for cellular vehicle -to-everything (C-V2X) services supporting ultra-reliable and low latency communication (URLLC)NewJeongwook GO,
Youngjae KIM,
Jae Eon OH,
Seongki SHIN,
Heung Youl YOUM
TD1831 
7       15/17TR.smpaTechnical Report: Security middle platform architectureNewJingyang LI,
Ke WANG
Shuai WANG, 
Haodi ZHANG
TD1942 
8       15/17TR.srsecTechnical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators Gang DU,
Xuetao DU,
Chen ZHANG
TD1397 



Annex C
New work items

The following 54 new work items were agreed to be added to the SG17 Work Programme:

#QWork itemTitleEditorTimingTDC
1.       Q1/17TR.cs-uc**Technical report:  Use cases for extracting the security requirements for cyber security reference architectureDa Eun HYEON,
Juhee KI,
Sungchae PARK,
Heung Youl YOUM
2025-Q4
TD1815C583
2.       Q1/17TR.cs-sc**Technical report:  Collection of Security Concerns to support X.cs-ra Cyber Security Reference ArchitectureN. Kishor NARANG,
Jitender PRAKASH,
Preetika SINGH,
Pushpendra Kumar SINGH
2025-Q4TD1859C639
3.       Q1/17CRAMM Roadmap**SG17 Cyber Security Reference Architectures, Models and Methodologies RoadmapArnaud TADDEI2026-Q4TD1877C652
4.       Q2/17TR.sg-lmcs Technical report:  Security guidelines for DLT-based lifecycle management of computing servicesLanfang REN,
Junzhi YAN,
Bo YANG,
Huachun ZHOU
2026-09TD1870C609
5.       Q2/17TR.sec-int-cpcTechnical report:  Security considerations for interconnection of computing power centersXiang LIU,
Yu ZHANG,
Weizhe ZHANG,
Yu JIANG
2026-03TD1885C508
6.       Q2/17TR.sd-cncTechnical report:  Security guidelines for data of coordination of networking and computingTingting YANG,
Ke WANG,
Li SU
2026-09TD1906C573
7.       Q2/17X.ztmc*Guidelines for high level Zero trust model and its security capabilities in telecommunication networksHeung Youl YOUM,
Junhyung PARK
2026-09TD1863C526
8.       Q3/17X.cdc-csirtRelationships between Cyber Defence/Security Centre and Computer Security Incident Response TeamArnaud TADDEI2026 Q4TD1818C613
9.       Q3/17X.1060-revFramework for the creation and operation of a cyber defence/security centreArnaud TADDEI
Shigenori TAKEI
2025 Q4TD1878C613
10.    Q3/17X.1058-rev*Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection Heung Youl YOUM,
ChangOh KIM,
Sungchae PARK,
Thaib MUSTAFA,
Jinghua MIN
2027TD1955TD1671 TD1746
11.    Q4/17X.nspamSecurity framework for network storage protection against malware attacksJonghyun WOO,
Sungyong SHIN,
Bongchan KIM,
Jonghyun KIM,
Sujung PARK
2026-03TD1822C563
12.    Q4/17X.gpmrGuidelines and security measures for prevention and mitigation of ransomwareWenlei WANG,
Mufan CUI,
Zhihui HAN,
Feng GAO,
Minfeng QIU
2026-06TD1852C544
13.    Q6/17TR.st-iot**Technical report:  Security threat scenarios in Internet of things Dalton C. G. VALADARES, Ernesto Marcos SILVEIRA2025-8TD1925C616
14.    Q6/17X.sm-iot*Technical requirements of security situation monitoring for Internet of things (IoT) devicesLijun LIU,
Hang DONG,
Shuang ZHANG,
Le YU,
Xiaoqin HUANG
2026-03TD1891C610
15.    Q6/17X.gnssa-iot*Guidelines of implementing network security situational awareness for IoT systemsMaofei CHEN,
Laifu WANG,
Dongxin LIU,
Zhaoji LIN
2027-02TD1862C579
16.    Q7/17X.fr-vsasiFunctional requirements for visualization service of network security assets and security incidents based on digital twinJunjie XIA,
Feng GAO,
Mengxiang HAN,
Ke WANG
2025-3QTD1871C634
17.    Q7/17X.iasFunctional requirements for the unified authentication service of telecommunication operatorsHang DONG,
Chen ZHANG,
Yunfa ZHU
2026-1QTD1867C647
18.    Q7/17X.str-irs*Security threats and requirements for information recommendation serviceYunwei ZHAO,
Zhiyuan HU,
Junzhi YAN
2027-1QTD1801C546
19.    Q7/17X.sgrtem*Security guidelines for real-time event monitoring and integrated management in smart city platformsJunjie XIA,
Feng GAO,
Chang SONG
2026-1QTD1813C633
20.    Q8/17X.FR-MSPFunctional Requirements of Microsegmentation Platform in a cloud-based environmentShuai WANG,
Haodi ZHANG,
Huamin JIN
2027-03TD1880C623
21.    Q8/17X.ckrpFramework of cryptographic key resource pool for cloud computingJun SHEN,
Ming HE,
Leyi ZHANG
2026-02TD1840C597
22.    Q8/17X.mbaas-cs-secSecurity requirements and framework of collaboration service for multiple blockchain as a service platformsXiongwei JIA,
Keng LI,
Kyeong Hee OH,
Yuwei WANG
2025-12TD1842C581
23.    Q8/17X. gapci*Guidelines on Anti-DDoS protection for cloud infrastructureLin CHEN,
Yue SHI,
Nan MENG,
Hang DONG
2026-02TD1886C541
24.    Q10/17X.1254rev*Entity authentication assurance frameworkAbbie BARBIR,
Sylvan TRAN
2026-03TD1969  C483
25.    Q10/17X.oob-pacsFramework for out-of-band physical access control systems using beacon-initiated mutual authenticationJonghyun WOO,
Heejun SHIN,
Il Jin JUNG,
Tail LEE,
Youngjoo LEE,
Sujung PARK
2026-03TD1964  C562
26.    Q10/17X.tisTelebiometric authentication based on information splittingMyung Geun CHUN 2025-09TD1934  C565
27.    Q10/17TR.divs**Technical report:  Rationale and initial approach of a decentralized identity verification system (DIVS) based on verifiable dataHeung Youl YOUM,
Sungchae PARK
2025-09TD1948   C570
28.    Q10/17TR.SIMRegBio**Technical report:  Guidelines for SIM Identity and Biometrics Registration.

Kwadwo Gyamfi OSAFO-MAAFO,
Opeolu OYEBANJI,
Shamsuddeen SABO, Pushpendra Kumar SINGH

2026-09TD1933C645
29.    Q11/17X.500Amd.1The Directory: Overview of concepts, models and servicesErik ANDERSEN2024-09TD1913

C490
30.    Q11/17X.501Amd.2The Directory: ModelsErik ANDERSEN2024-09TD1914C491
31.    Q11/17X.509Amd.1The Directory: Public-key and attribute certificate frameworksErik ANDERSEN,
Qin LI
2024-09TD1919C492
32.    Q11/17X.510Amd.1The Directory - Protocol specifications for secure operations  Erik ANDERSEN,
Qin LI
2024-09TD1921C493
33.    Q11/17X.511Amd.1The Directory: Abstract service definitionErik ANDERSEN
2024-09TD1915C494
34.    Q11/17X.518Amd.1The Directory: Procedures for distributed operationErik ANDERSEN2024-09TD1916C495
35.    Q11/17X.519Amd.1The Directory: Protocol specifications  Erik ANDERSEN2024-09TD1917C496
36.    Q11/17X.520Amd.1The Directory: Selected attribute typesErik ANDERSEN2024-09TD1918C497
37.    Q11/17X.521Amd.1The Directory: Selected object classesErik ANDERSEN2024-09TD1922C498
38.    Q11/17X.525Amd.1The Directory: ReplicationErik ANDERSEN2024-09TD1920C499
39.    Q13/17X.aamd-sec*Security guidelines for categorized data in advanced air mobility (AAM)Seungwook PARK,
Changhun JUNG,
Yousik LEE,
Sang-woo LEE

2027-03

 

 

TD1820C560
40.    Q14/17X.qsdlt-ca*Guidelines for building crypto-agility and migration for quantum-safe DLT systemsFuwen LIU,
Ke WANG,
WeiDong WANG,
Li SU,
Heung Youl YOUM
2026-3TD1869C582
41.    Q14/17TR.dw-lasf**Technical report:  A landscape analysis and security features for a digital wallet    Kyeong Hee OH,
Dong Bin CHOI,
Xiaoyuan BAI,
Xiongwei JIA
2026-3TD1802C564
42.    Q14/17X.1400revTerms and definitions for distributed ledger technology

Heung Youl YOUM,
Sungchae PARK,
Jae Nam KO

2025-3TD1799C552
43.    Q14/17X.sr-dpts*Security requirements for DLT data on permissioned DLT-based distributed power trading systemsJong-Hyouk LEE,
Taeyang LEE,
Haneul LEE
2025-9TD1836C566
44.    Q14/17X.sg-dcs*Security guidelines for DLT-based digital collection servicesJong-Hyouk LEE,
Jihye KIM
2025-9TD1837C509
45.    Q14/17TR.gscim-dlt**Technical report:  Guidelines for security consideration for incident management by DLT service providerYunwei ZHAO,
Yue CHEN,
Han HAN,
Ke WANG,
Junzhi YAN,
2026-9TD1828C548
46.    Q15/17X.sr-da-gai*Security threats and requirements for data annotation service of generative artificial intelligence"Yunwei ZHAO,
Zhiyuan HU,
Luhua WANG,
Hong ZHANG,
Junjie XIA
2027-03TD1819C545
47.    Q15/17X.sgGenAI*Security Guidelines for Generative Artificial Intelligence Application Service

Huifang LI,
Yang CHEN,
Ye TAO,
Sungchae PARK

2026- Q3TD1834C635
48.    Q15/17X.ig-dw*Implementation guidelines for digital watermarkingShiqi LI,
Yong SUN,
Weiwei SUN
2026-09TD1972C542
49.    Q15/17X.sc-sscti*Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications IndustryBaoqi YAN,
Jia XIE,
Yuanying XIAO
2027-Q1TD1974C567
50.    Q15/17TR.se-ai**Technical report:  Security Evaluation on Artificial Intelligence Technology in ICTQuanchao LIU,
Ke WANG,
Jia CHEN,
Yong SUN
2025-08TD2002C584
51.    Q15/17X.srm-fml*Security requirements and measures of federated machine learningQiuli MEI,
Xiongwei JIA,
Jianing CHEN
2026-02TD1994C605
52.    Q15/17X.pg-cla:Procedural guideline for continual learning to actively respond to network attacksJongyoul PARK,
Jae Hoon NAH
August 2025TD2005C500
53.    Q15/17TR.ac-pqc**Technical report:  Guidance on use of advanced cryptography based on PQCKoji NAKAO2025-09TD1990C654
54.    Q15/17TR.QKDN-SP**Technical report:  Overview of security profile for Quantum Key Distribution Networks in hybrid modVenkata Rama Raju CHELLE,
Ravindra Pratap SINGH,
Prabhakar KRISHNAN,
Soumya DAS
2025TD1970C658

 

Note:  * marked items are for approval by TAP;  ** marked items are for approval by agreement; Items without any mark are for approval by AAP.​

Annex D
Work items discontinued

QuestionAcronymTitle
None  


Annex E
SG17 meeting Statistics

 Participants# of Countries# of Member States# of Sector Members# of SG17 Associates# of Academia# of Invited Experts
Announced4336153    
Final3335549323611
  • ​Meeting input and organization

Table of SG17 statistics of this and some past meetings

 

2024-03

2023-09

2023-03

2022-09

2022-05*

C

187

153

119

104

101

LS/i

89

60

70

55

72

LS/o

41

25

23

20

20

TD

520

415

394

342

331

Note * - fully virtual meeting

  • Contributions: 187 – New record, DDP: 98%.
    • APT 154 (82%) (= China 77 + Korea 54 + Japan 10 + India 9 + Malaysia 2+ Singapore 1+ Iran 1)
    • EUR 18 (10%) (Denmark 11 + UK 7)
    • Americas 9 (5%) (= US 8 + Brazil 1)
    • AFR 5 (3%) (South Africa 1.25 + Uganda 1.25 + Ghana 1.25 + Mali 1 + Nigeria 0.25)
    • RCC 1 (= Russia 1)
    • LAM (0), ARAB (0). 
  • LSi/o (matrix in TD1515) (past meetings: 60/25, 61/22, 55/21, 72/21)
    • Incoming 89 – New record
    • Outgoing 41 - New record
  • TDs: 520 – New record
​​