Documentos Temporales
(PLEN)
|
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 591-PLEN ]
|
Identity Channels, Addressing the diversity of the IdM use cases
|
Q10/17 Rapporteur
|
Q10/17
|
2013-08-29 |
|
[ 590-PLEN ]
(Rev.1) |
Q10/17 comments to France's answer to the TAP consultation on draft new Recommendation X.1255 "Framework for discovery of identity management information" - TSB Circular 24
|
Q10/17 Rapporteur
|
QALL/17, Q10/17
|
2013-08-29 |
|
[ 589-PLEN ]
(Rev.1-3) |
The 9th revised text on draft Recommendation ITU-T X.trm (X.1210): Overview of source based security troubleshooting mechanisms for Internet Protocol-based networks
|
X.trm Editors
|
Q4/17
|
2013-08-29 |
|
[ 588-PLEN ]
(Rev.1-3) |
Revised text for X.ccsec: security framework for cloud computing
|
X.ccsec Editors
|
Q8/17
|
2013-08-29 |
|
[ 587-PLEN ]
|
Recommendation X.1500 (2011) Amendment 4, Overview of cybersecurity information exchange (CYBEX), (for approval)
|
Rapporteur Q4/17
|
Q4/17
|
2013-08-28 |
|
[ 586-PLEN ]
|
Agenda for Q2/17 and Q3/17 joint meeting
|
Q2/17 and Q3/17 Rapporteur
|
Q3/17, Q2/17
|
2013-08-28 |
|
[ 585-PLEN ]
(Rev.1) |
Agenda for Q3/17 and Q8/17 joint meeting
|
Q3/17 and Q8/17 Rapporteur
|
Q8/17, Q3/17
|
2013-08-28 |
|
[ 584-PLEN ]
(Rev.1) |
Special session for discussion of any regulatory and policy implications of revised Question 6/17, Thursday, 29 August 2013, 12:30-13:30, room Popov
|
Chairman
|
QALL/17
|
2013-08-28 |
|
[ 583-PLEN ]
(Rev.1-2) |
Baseline text for draft Recommendation X.cap, Common Alerting Protocol 1.2
|
Rapporteur Q4/17
|
Q4/17
|
2013-08-28 |
|
[ 582-PLEN ]
|
Agenda for Question 3/17 and Q10/17 joint meeting
|
Q3/17 and Q10/17 Rapporteur
|
Q4/17, Q3/17
|
2013-08-28 |
|
[ 581-PLEN ]
(Rev.1-2) |
SDL 2010 Route Map - August 2013
|
Q12/17 Associate Rapporteur
|
Q12/17
|
2013-08-28 |
|
[ 580-PLEN ]
(Rev.1-2) |
Updated draft text for X.1051-rev with editor's notes
|
X.1051 Editor
|
Q3/17
|
2013-08-28 |
|
[ 579-PLEN ]
|
ITU-T Standardization on Countering Spam
|
5/17 Rapporteur
|
Q5/17
|
2013-08-28 |
|
[ 578-PLEN ]
|
Useful resources for SG17's analysis on the security implication of SDN
|
Q1/17 Associate Rapporteur
|
QALL/17
|
2013-08-28 |
|
[ 577-PLEN ]
|
The 3rd revised text for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
|
X.gpim Editor
|
Q3/17
|
2013-08-28 |
|
[ 576-PLEN ]
|
Q4/17 comments to Contribution 116, NWI proposal on "Interaction of the IP-based National security center of the public telecommunications network with the security management systems of national operators for developing countries"
|
Rapporteur Q4/17
|
Q4/17
|
2013-08-27 |
|
[ 575-PLEN ]
|
LS/i on Text 2nd WD 27044 - Text for ISO/IEC 2nd WD 27044, Information technology - Security techniques - Guidelines for security information and event management (SIEM) [N12677 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q4/17, Q3/17
|
2013-08-27 |
|
[ 574-PLEN ]
|
LS/i on Text 2nd WD 27033-1 - Text for ISO/IEC 2nd WD 27033-1, Information technology - Security techniques - Network security - Part 1: Overview and concepts [N12658 from ISO/IEC JTC 1/SC 27]
|
ISO/IEC JTC 1/SC 27
|
Q2/17
|
2013-08-27 |
|
[ 573-PLEN ]
|
Draft Recommendation ITU-T X.maec, Malware attribute enumeration and characterization (for determination)
|
Q4/17 Rapporteur
|
Q4/17
|
2013-08-27 |
|
[ 572-PLEN ]
|
Status and draft of the revised version of Z.Supl
|
Q12/17 Associate Rapporteur
|
Q12/17
|
2013-08-27 |
|
[ 571-PLEN ]
(Rev.1-2) |
Proposed changes to Z.100 series for SDL-2010
|
Q12/17 Associate Rapporteur
|
Q12/17
|
2013-08-27 |
|
[ 570-PLEN ]
|
Status and draft of the revised version of Z.100 Annex F.1
|
Q12/17 Associate Rapporteur
|
Q12/17
|
2013-08-27 |
|
[ 569-PLEN ]
|
Table of Revisions to Z.100 Annex F2 and Annex F3
|
Q12/17 Associate Rapporteur
|
Q12/17
|
2013-08-27 |
|
[ 568-PLEN ]
|
Agenda for Q3/17 and Q4/17 joint meeting
|
Q3/17 and Q4/17 Rapporteur
|
Q4/17, Q3/17
|
2013-08-27 |
|
[ 567-PLEN ]
|
Proposed draft new version of the Part 1 and 2 of the Security Compendium
|
Q1/17 Rapporteur
|
Q1/17
|
2013-08-26 |
|
[ 566-PLEN ]
|
Initial allocation of Liaison Statements from ISO/IEC JTC1/SC27 to Question(s)
|
Vice-Chairman SG17, Liaison officer SC27
|
QALL/17, Q8/17, Q4/17, Q3/17, Q2/17, Q11/17, Q10/17, Q1/17
|
2013-08-26 |
|
[ 565-PLEN ]
|
Draft Recommendation X.th4 Biology
|
Editor
|
Q9/17
|
2013-08-25 |
|
[ 564-PLEN ]
|
LS/i on update of IEC/TC 25 Activities [from IEC/TC 25]
|
IEC/TC 25
|
Q9/17
|
2013-08-22 |
|
[ 563-PLEN ]
|
LS/i on Text for ISO/IEC FDIS 27033-4, Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways
|
ISO/IEC JTC 1/SC27
|
WP1/17, Q7/17
|
2013-08-20 |
|
[ 562-PLEN ]
|
Report on collaboration with the SDL Forum Society - August 2013
|
Q12/17 Associate Rapporteur
|
QALL/17, Q12/17
|
2013-08-20 |
|
[ 561-PLEN ]
|
Editor's Reply to TD 0555: France's answer to the TAP consultation on draft new Recommendation X.1255 "Framework for discovery of identity management information" - TSB Circular 24
|
Editor
|
Q10/17, (QALL/17)
|
2013-08-15 |
|
[ 560-PLEN ]
|
Japan's answer to the TAP consultation on draft new Recommendation X.1208 "Guideline for cybersecurity index." - TSB Circular 24
|
TSB
|
Q4/17, (QALL/17)
|
2013-08-13 |
|
[ 559-PLEN ]
(Rev.1-4) |
Draft for a revised version of Z.109
|
Q12/17 Associate Rapporteur
|
Q12/17
|
2013-08-15 |
|
[ 558-PLEN ]
|
Status of draft Rec. ITU-T X.1037 in AAP
|
TSB
|
Q2/17, (Q3/17)
|
2013-08-08 |
|
[ 557-PLEN ]
|
Status of ISO/IEC/ITU-T Strategic Advisory Group on Security (SAG-S)
|
TSB
|
QALL/17
|
2013-08-05 |
|
[ 556-PLEN ]
|
Joint Internet Society, CITEL (PCC.I), and ITU workshop on Combating SPAM - Mendoza, Argentina, 7 October 2013
|
TSB
|
Q5/17, (QALL/17)
|
2013-08-02 |
|
[ 555-PLEN ]
|
France's answer to the TAP consultation on draft new Recommendation X.1255 "Framework for discovery of identity management information" - TSB Circular 24
|
TSB
|
Q10/17, (QALL/17)
|
2013-08-02 |
|
[ 554-PLEN ]
(Rev.1-2) |
Draft report of the third (virtual) meeting of the ITU-T JCA-COP, 23 July 2013
|
TSB
|
Qall/17
|
2013-07-25 |
|
[ 553-PLEN ]
|
LS/i/r on request to provide security contacts
|
ITU-R Working Parties 5A, 5B, 5C and 5D
|
Q1/17
|
2013-07-25 |
|
[ 552-PLEN ]
(Rev.1) |
The final text of Draft X.xacml3, eXtensible Access Control Markup Language (XACML) Version 3.0 for consent
|
Editors
|
Q7/17, (Q10/17)
|
2013-07-25 |
|
[ 551-PLEN ]
|
LS/i on 3rd WD 27033-6 - Information technology - Security techniques - Network security - Part 6: Securing wireless IP network access [N12660 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
WP1/17, Q1/17
|
2013-07-22 |
|
[ 550-PLEN ]
|
Conformance and Interoperability - Key activities and main results of ITU-T SGs for the implementation of ITU C&I Programme
|
TSB
|
QALL/17
|
2013-07-22 |
|
[ 549-PLEN ]
|
Introduction to 3rd Cyber Space conference, Seoul, 17 - 18 October 2013
|
SG17 Vice chairman
|
Q4/17, (QALL/17)
|
2013-07-22 |
|
[ 548-PLEN ]
(Rev.1) |
ITU-T Recommendations referencing withdrawn ISO/IEC standards
|
TSB
|
Q9/17, Q6/17, Q4/17, Q3/17, Q2/17, Q11/17, Q1/17, (QALL/17)
|
2013-07-22 |
|
[ 547-PLEN ]
|
LS/i on new versions of the Access Network Transport (ANT) Standardization Overview and Work Plan [from ITU-T SG15]
|
ITU-T SG15
|
Q1/17
|
2013-07-22 |
|
[ 546-PLEN ]
|
LS/i on Disposition of Comments on SC 27 N12294 Summary of National Body comments received on SC 27 N11916 -- ISO/IEC 4th WD 27017 - Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 [N12767 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q8/17
|
2013-07-22 |
|
[ 545-PLEN ]
|
LS/i on ISO/IEC 2nd CD 27043 - Information technology -- Security techniques - Incident investigation principles and processes [N12687 from ISO/IEC JTC 1/SC27
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 544-PLEN ]
|
LS/i on 1st WD 27050 - Text for ISO/IEC 1st WD 27050, Information technology - Security techniques - Electronic discovery [N12679 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q3/17
|
2013-07-22 |
|
[ 543-PLEN ]
|
LS/i on 3rd WD 27035-3 - Text for ISO/IEC 3rd WD 27035-3, - Security techniques - Information security incident management - Part 3: Guidelines for incident response operations [N12672 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
|
[ 542-PLEN ]
|
LS/i on 3rd WD 27035-2 - Text for ISO/IEC 3rd WD 27035-2, Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response [N12670 from ISO/IEC JTC 1/SC27]
|
ISO/IEC JTC 1/SC27
|
Q4/17, Q3/17
|
2013-07-22 |
Resultados :325 documentos Resultados :
Anterior -
1 -
2 -
3 -
4 -
5 -
6 -
7
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):