Contributions |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 383 ]
|
Proposed additions to draft of Recommendation x.pki-em: Public-Key Infrastructure: Establishment and maintenance
|
Danish Business Authority
|
Q11/17
|
2015-03-26 |
|
[ 382 ]
|
Comment on X.cc-control
|
KDDI Corporation
|
Q8/17, Q3/17
|
2015-03-26 |
|
[ 381 ]
|
Proposal to amend the Appendix II of X.1500
|
National Institute of Information and Communications Technology (NICT)
|
Q4/17
|
2015-03-26 |
|
[ 380 ]
|
Proposed modification contribution to draft Recommendation X.IAMT - Identity and Access Management Taxonomy
|
MBNA Canada
|
Q10/17
|
2015-03-26 |
|
[ 379 ]
|
New baseline text of Software update capability for ITS communications devices (X.itssec-1)
|
Hitachi, Ltd.
,
KDDI Corporation
,
National Institute of Information and Communications Technology
|
Q6/17
|
2015-03-26 |
|
[ 378 ]
|
The proposal on development of ITU-T Recomendation on providing security for smart grid
|
Ministry of Telecom and Mass Communications of the Russian Feder
|
Q4/17
|
2015-03-26 |
|
[ 377 ]
(Rev.1) |
Proposals on big data application to ensure cybersecurity and protect communications operators
|
Ministry of Telecom and Mass Communications of the Russian Feder
|
Q4/17
|
2015-03-26 |
|
[ 376 ]
|
New work item for Notification Elevation Service for Security Assessment (NESSA)
|
Ministry of Telecom and Mass Communications of the Russian Feder
|
Q4/17
|
2015-03-26 |
|
[ 375 ]
|
Proposed updates to X.oid-iot
|
Ministry of Industry and Information Technology (MIIT)
,
ZTE Corporation
|
Q11/17
|
2015-03-26 |
|
[ 374 ]
(Rev.1) |
Privacy-based access control - security and privacy protection of telebiometrics data
|
Danish Business Authority
|
Q9/17
|
2015-03-26 |
|
[ 373 ]
(Rev.1) |
Proposed editorial revision of X.sfcse
|
China Telecommunications Corporation
|
Q8/17
|
2015-03-26 |
|
[ 372 ]
(Rev.1) |
Draft Recommendation ITU-T X.authi: Guidelines and framework for sharing network authentication results with service applications
|
China Mobile Communications Corporation
|
Q10/17
|
2015-03-26 |
|
[ 371 ]
(Rev.1) |
Comments on X.1051-rev, "Code of practice for information security controls based on ISO/IEC 27002 for telecommunications organizations"
|
KDDI Corporation
|
Q3/17
|
2015-03-26 |
|
[ 370 ]
|
A proposed text of draft Recommendation ITU-T X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-03-26 |
|
[ 369 ]
|
Proposal for updating the contents of X.gsiiso
|
China Unicom
|
Q2/17
|
2015-03-25 |
|
[ 368 ]
(Rev.1) |
Proposal for revising the text of X.sbb section 9
|
China Unicom
|
Q4/17
|
2015-03-25 |
|
[ 367 ]
|
Proposal for a new work item on Credit Assurance Framework for Online Services
|
China Unicom
|
Q10/17
|
2015-03-25 |
|
[ 366 ]
|
Proposed revision to X.cogent, Design considerations for improved end-user perception of trustworthiness indicators
|
National Institute of Information and Communications Technology (NICT)
,
The University of Tokyo
|
Q4/17
|
2015-03-25 |
|
[ 365 ]
|
Contribution-Proposal for a new work item Security requirements for database in cloud
|
China Unicom
,
Ministry of Industry and Information Technology (MIIT)
,
ZTE Corporation
|
Q8/17
|
2015-03-25 |
|
[ 364 ]
(Rev.1) |
Contribution-Proposal for a new work item Security requirements for monitoring services in cloud
|
China Unicom
,
Ministry of Industry and Information Technology (MIIT)
|
Q8/17
|
2015-03-25 |
|
[ 363 ]
|
Proposed modification on clause 8 of X.sbb
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q4/17
|
2015-03-25 |
|
[ 362 ]
|
X.sbb: Proposed new characteristic and threat on mobility of smartphone-based botnets
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q4/17
|
2015-03-25 |
|
[ 361 ]
|
New baseline text of Simple encryption procedure for IoT device security (X.iotsec-1)
|
Hitachi, Ltd.
|
Q6/17
|
2015-03-25 |
|
[ 360 ]
|
Proposed draft text of data security lifecycle for X.CSCdataSec
|
Ministry of Industry and Information Technology (MIIT)
|
Q8/17
|
2015-03-25 |
|
[ 359 ]
|
Proposed draft text of security controls for X.CSCdataSec
|
Ministry of Industry and Information Technology (MIIT)
|
Q8/17
|
2015-03-25 |
|
[ 358 ]
|
Proposed revised skeleton for X.CSCdataSec
|
Ministry of Industry and Information Technology (MIIT)
|
Q8/17
|
2015-03-25 |
|
[ 357 ]
(Rev.1-3) |
Proposal for X.tfcmm: content revise for improvement
|
China Unicom
|
Q5/17
|
2015-03-25 |
|
[ 356 ]
(Rev.1-3) |
Proposal for X.tfcmm: content revise for clause 3
|
China Unicom
|
Q5/17
|
2015-03-25 |
|
[ 355 ]
(Rev.1) |
Proposal for X.idmcc: add content for clause 7
|
China Unicom
|
Q10/17
|
2015-03-25 |
|
[ 354 ]
(Rev.1) |
Proposal for X.idmcc: improve clause 6
|
China Unicom
|
Q10/17
|
2015-03-25 |
|
[ 353 ]
(Rev.1) |
Proposal for X.idmcc: improve definition of Identity Management as a Service
|
China Unicom
|
Q10/17
|
2015-03-25 |
|
[ 352 ]
(Rev.1) |
Proposal for X.websec-6: add contents of clause 7
|
China Unicom
|
Q7/17
|
2015-03-25 |
|
[ 351 ]
(Rev.1) |
Proposal for X.websec-6: add contents of clause 6
|
China Unicom
|
Q7/17
|
2015-03-25 |
|
[ 350 ]
(Rev.1) |
Propose skeleton for X.websec-6
|
China Unicom
|
Q7/17
|
2015-03-25 |
|
[ 349 ]
(Rev.1) |
Proposal for a new work item: Security Requirements Framework and Framework Requirements for Big Data Analysis in Mobile Internet Services
|
China Unicom
,
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-03-25 |
|
[ 348 ]
(Rev.1) |
Proposed editorial revision of the draft recommendation X.goscc
|
China Telecommunications Corporation
,
ZTE Corporation
|
Q8/17
|
2015-03-25 |
|
[ 347 ]
|
Proposal new text of technical requirements for X.cspim
|
China Telecommunications Corporation
|
Q5/17
|
2015-03-25 |
|
[ 346 ]
|
Proposal a new sub clause of technical requirements for X.cspim
|
China Telecommunications Corporation
|
Q5/17
|
2015-03-25 |
|
[ 345 ]
|
Proposal of a new work item for revising X.1601
|
Ministry of Industry and Information Technology (MIIT)
|
Q8/17
|
2015-03-25 |
|
[ 344 ]
|
New Focus Group on Critical Infrastructure Protection and ICT Security (FG-CIPIS)
|
Kaspersky Lab ZAO
|
QALL/17
|
2015-03-24 |
|
[ 343 ]
|
A Proposed text of clause 8.2 ITU-T X.p2p-3: security requirements and mechanisms of P2P-based telecommunication network
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q7/17
|
2015-03-24 |
|
[ 342 ]
|
Proposal for allocating a new common OID arc for IoT and resubmission of New Work Item Proposal for X.oiddev
|
Electronics and Telecommunications Research Institute (ETRI)
|
Q11/17
|
2015-03-24 |
|
[ 341 ]
|
New work item proposal for security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
|
Q2/17
|
2015-03-24 |
|
[ 340 ]
(Rev.1) |
Practical guidance for a legal strategy to coordinate activities aimed at enacting and enforcing cyber crime legislation
|
Indonesia
|
PLEN/17
|
2015-03-23 |
|
[ 339 ]
(Rev.1) |
Proposal for the technical framework for X.cspim
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2015-03-23 |
|
[ 338 ]
(Rev.1) |
Proposal for a new clause for X.cspim
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2015-03-23 |
|
[ 337 ]
|
Proposal for a new work item: Technical Framework for Countering Mobile In-application Advertising Spam
|
Beijing University of Posts and Telecommunications
,
China Telecommunications Corporation
,
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2015-03-23 |
|
[ 336 ]
|
Proposal for revised draft text of X.1085: Telebiometric authentication framework using biometric hardware security module
|
Korea (Rep. of)
|
Q9/17
|
2015-03-20 |
|
[ 335 ]
|
Proposal of the 1st revised text for Recommendation ITU-T X.itssec-2
|
Korea (Rep. of)
|
Q6/17
|
2015-03-20 |
|
[ 334 ]
|
Proposal for the first revised text for draft Recommendation X.sdnsec-1: Requirements for security services based on software-defined networking
|
Korea (Rep. of)
|
Q6/17
|
2015-03-20 |
Resultats:75 documents Résultats :
1 -
2
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):