Documentos Temporales
(WP2)
|
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 2434-WP2 ]
|
First draft text of X.msec-4 from Editors
|
Editors
|
Q9/17
|
2006-11-07 |
|
[ 2433-WP2 ]
|
First draft text of X.crs: correlative reacting system in mobile data communication
|
Editors
|
Q9/17
|
2006-11-07 |
|
[ 2432-WP2 ]
|
Reply to liaison concerning "ITU-T Candidate Recommendation X.homesec-1 - Framework of security technologies for home network."
|
ITU-T SG 9
|
Q9/17
|
2006-10-23 |
|
[ 2431-WP2 ]
|
X.tpp-1 (Telebiometric Protection Procedures-Part1): A Guideline of Technical and Managerial Countermeasures for Biometric Data Security
|
Editor
|
Q8/17
|
2006-10-23 |
|
[ 2430-WP2 ]
|
Draft text of X.tai: Telebiometrics Authentication Infrastructure (TAI)
|
Editor
|
Q8/17
|
2006-10-23 |
|
[ 2429-WP2 ]
|
Baseline input text for X.rmg, Risk management guidelines for telecommunications
|
Editor
|
Q7/17
|
2006-10-23 |
|
[ 2428-WP2 ]
|
1st Draft of X.sim: Security Incident Management Guidelines for Telecommunications
|
Editor
|
Q7/17
|
2006-10-23 |
|
[ 2427-WP2 ]
|
Information Technology - BioAPI Interworking Protocol
|
Editor
|
Q8/17
|
2006-10-23 |
|
[ 2426-WP2 ]
|
ITU-T Candidate Recommendation X.ngn-akm - Framework for EAP-based Authentication and Key Management of NGN
|
Editor
|
Q5/17
|
2006-10-23 |
|
[ 2425-WP2 ]
|
Report of the Joint Rapporteur Groups meeting on security, Ottawa, Canada, 11-15 September 2006
|
Chairman, WP 2/17
|
Q17/17, Q9/17, Q8/17, Q7/17, Q6/17, Q5/17
|
2006-10-23 |
|
[ 2424-WP2 ]
|
Reply LS on summary of ITU-T Study Groups security related activities (COM 17-LS 81)
|
ITU-T SG 6
|
Q4/17
|
2006-09-29 |
|
[ 2423-WP2 ]
|
New Question 22/1 Securing information and communication networks: Best practices for developing a culture of cybersecurity
|
ITU-D SG 1
|
Q6/17, Q4/17
|
2006-09-29 |
|
[ 2422-WP2 ]
|
Outgoing LS: Answer concerning request for relevant data to populate the telebiometric database
|
ITU-T SG 5
|
Q8/17
|
2006-09-29 |
|
[ 2421-WP2 ]
|
Outgoing LS: ITU-T SG5 Security Related Activities
|
ITU-T SG 5
|
Q4/17
|
2006-09-29 |
|
[ 2420-WP2 ]
|
Withdrawn (see TD 2426)
|
N/A (no se aplica)
|
Q5/17
|
2006-09-20 |
|
[ 2419-WP2 ]
|
Draft Recommendation X.1051 (rev.), Information Security Management Guidelines for telecommunications based on ISO/IEC 27002
|
Editor
|
Q7/17
|
2006-09-19 |
|
[ 2418-WP2 ]
|
Draft Recommendation X.pak, Password-Authenticated Key Exchange (PAK) Protocol
|
Editors
|
Q5/17
|
2006-09-19 |
|
[ 2417-WP2 ]
|
Updated draft text of X.crs: correlative reacting system in mobile data communication
|
Editors
|
Q9/17
|
2006-09-15 |
|
[ 2416-WP2 ]
|
Revised text of X.msec-4 from Editors
|
Editors
|
Q9/17
|
2006-09-15 |
|
[ 2415-WP2 ]
|
Draft text on X.rfidsec-1: Privacy Protection Framework for Networked RFID Services
|
Rapporteur/Editors
|
Q9/17
|
2006-09-15 |
|
[ 2414-WP2 ]
|
X.homesec-2 : Device certificate profile for the home network
|
Editor
|
Q9/17
|
2006-09-14 |
|
[ 2413-WP2 ]
|
Draft text on X.rfpg : Proposal for Developing the Guideline on Protection Personal Information and Privacy for RFID
|
Rapporteur/Editors
|
Q6/17
|
2006-09-14 |
|
[ 2412-WP2 ]
|
Withdrawn (see TD 2426)
|
N/A (no se aplica)
|
Q5/17
|
2006-09-13 |
|
[ 2411-WP2 ]
|
ITU-T Candidate Recommendation X.homesec-1 - Framework of security technologies for home network
|
Editor
|
Q9/17
|
2006-09-13 |
|
[ 2410-WP2 ]
|
Baseline document for Recommendation X.p2p-1 (Requirements of security for peer-to-peer communications)
|
Editor
|
Q9/17
|
2006-09-13 |
|
[ 2409-WP2 ]
|
Revision of draft text on X.websec-3, Security architecture for message security in mobile Web Services
|
Editor
|
Q9/17
|
2006-09-13 |
|
[ 2408-WP2 ]
|
Baseline document for further discussion of X.sap-2
|
Editor
|
Q9/17
|
2006-09-13 |
|
[ 2407-WP2 ]
|
ITU-T Candidate Recommendation X.sap-1 - Guideline on secure password-based authentication protocol with key exchange
|
Editor
|
Q9/17
|
2006-09-13 |
|
[ 2406-WP2 ]
|
Reply LS to SG 17 on Progress on X.oscip "Overview of countering spam for IP multimedia applications"
|
Q.26/16 Rapp meeting
|
Q6/17
|
2006-09-12 |
|
[ 2405-WP2 ]
|
Response to ITU-T COM 17-LS 107 and COM 17-LS 108
|
Open Mobile Alliance
|
Q9/17
|
2006-09-04 |
|
[ 2404-WP2 ]
|
Liaison Statement reply to ITU-T Study Group 17, Question 17 on countering spam by technical means
|
ETSI TISPAN
|
Q17/17
|
2006-08-23 |
|
[ 2403-WP2 ]
|
Response to the Liaison Statement from SG 17 Status of WTSA Resolution 50 Obligations
|
ITU-T SG 13
|
Q4/17
|
2006-08-23 |
|
[ 2402-WP2 ]
|
Response to a liaison statement from SG 17 entitled draft Recommendation X.ngn-akm
|
ITU-T SG 13
|
Q5/17
|
2006-08-23 |
|
[ 2401-WP2 ]
|
Liaison on information from Daidalos
|
ITU-T SG 13
|
Q6/17
|
2006-08-23 |
|
[ 2400-WP2 ]
|
Response to SG 17 re: WTSA Resolution 50 Obligations
|
ITU-T SG 11
|
Q4/17
|
2006-08-23 |
|
[ 2399-WP2 ]
|
Response to SG 17 re: SG Security Related Activities
|
ITU-T SG 11
|
Q4/17
|
2006-08-23 |
|
[ 2398-WP2 ]
|
Call for contributions to WG4 Study Period on Cyber security (27N5246)
|
ISO/IEC JTC 1/SC 27
|
Q6/17
|
2006-08-22 |
|
[ 2397-WP2 ]
|
Text for ISO/IEC 2nd CD 19792 - Information technology - Security techniques - Security evaluation of biometrics (27N5121)
|
ISO/IEC JTC 1/SC 27
|
Q8/17
|
2006-08-21 |
|
[ 2396-WP2 ]
|
Text for ISO/IEC 1st WD 24760 - Information technology - Security techniques - A framework for identity management (27N5205)
|
ISO/IEC JTC 1/SC 27
|
Q6/17
|
2006-08-21 |
|
[ 2395-WP2 ]
|
Considering approval of the OASIS Common Alerting Protocol (CAP), v1.1 as an ITU-T Recommendation
|
OASIS
|
Q6/17
|
2006-08-21 |
|
[ 2394-WP2 ]
|
ISO/IEC FCD 27006 - Information technology - Security techniques - Requirements for the accreditation of bodies providing certification of information security management systems (27N5098)
|
ISO/IEC JTC 1/SC 27
|
Q7/17
|
2006-09-04 |
|
[ 2393-WP2 ]
|
Text for ISO/IEC 2nd CD 27005 - Information technology - Security techniques - Information security risk management (27N5096)
|
ISO/IEC JTC 1/SC27
|
Q7/17
|
2006-08-21 |
|
[ 2392-WP2 ]
|
Text for ISO/IEC 4th WD 27004 - Information technology - Security techniques - Information security management measurements (27N5094)
|
ISO/IEC JTC 1/SC 27
|
Q7/17
|
2006-08-23 |
|
[ 2391-WP2 ]
|
Text for ISO/IEC 2nd WD 27003 - Information technology - Security techniques - Information security managment system implementation guidance (27N5092)
|
ISO/IEC JTC 1/SC 27
|
Q7/17
|
2006-08-21 |
|
[ 2390-WP2 ]
|
Text for ISO/IEC 1st WD 27000 - Information technology - Security techniques - Information security management systems - Fundamentals and vocabulary (27N5090)
|
ISO/IEC JTC 1/SC 27
|
Q7/17
|
2006-08-21 |
|
[ 2389-WP2 ]
|
ISO/IEC 1st DE24761. Information technology security techniques - Authentification context for biometrics (27N5142)
|
ISO/IEC JTC 1/SC 27
|
Q8/17
|
2006-08-21 |
|
[ 2388-WP2 ]
|
Dispositions of comment received on document SC27 N4864 - ISO/IEC 2nd WD 24761 - Information technology - Security techniques - Authentification context for biometrics [in response to ND and SC37 comments presented in SC27 N5028, N5086] (27N5141)
|
ISO/IEC JTC 1/SC 21
|
Q8/17
|
2006-08-21 |
|
[ 2387-WP2 ]
|
Liaison Statement to ITU-T SG 17 from ISO/IEC JTC1/SC37 (37N1745)
|
ISO/IEC JTC 1/SC 37
|
Q8/17
|
2006-08-21 |
|
[ 2386-WP2 ]
|
SC37 Standing Document 12 (SD 12), SC 37 Project Description Information (37N1743)
|
ISO/IEC JTC 1/SC 37
|
Q8/17
|
2006-08-21 |
|
[ 2385-WP2 ]
|
Liaison statement on Identity Mangement (27 N 5193)
|
ISO/IEC JTC 1/SC 27
|
Q6/17
|
2006-06-22 |
Resultados :190 documentos Resultados :
Anterior -
1 -
2 -
3 -
4
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):