Unión Internacional de Telecomunicaciones   UIT
English  Français
 
Mapa Contáctenos Copia Imprimible
  Página principal : UIT-T : SG 17 : Contribuciones  Nuevo -  Busque los documentos de la reunión
   
UIT-T SG 17  C 

UIT-T SG 17

Seguridad

Periodo de estudios 2009

Resultados :756 documentos
Resultados :  Anterior -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16  - Siguiente Next
Contribuciones  Documents / Contributions
 
Número 
Título Origen AI/Cuestión
Fecha
[ 606 ]  
 
The 5th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index     Korea (Rep. of)   Q4/17   2012-02-07
[ 605 ]  
 
The 5th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms     Korea (Rep. of)   Q4/17   2012-02-07
[ 604 ]  
 
The 5th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks     Korea (Rep. of)   Q4/17   2012-02-07
[ 603 ]  
 
Specific needs for PII management guidelines for telecommunication organizations     Korea (Rep. of)   Q3/17   2012-02-07
[ 602 ]  
 
Comments on SG17 working structure for the next study period     KDDI Corporation   QALL/17   2012-02-07
[ 601 ]  
 
Agreement from X.discovery CG Teleconference     United Kingdom   Q10/17   2012-02-07
[ 600 ]  
 
UK Comments on COM 17 - R 41 - E Draft Recommendation ITU-T X.1037 (X.rev), Architectural systems for security controls for preventing fraudulent activities in public carrier networks     United Kingdom   Q2/17   2012-02-07
[ 599 ]  
 
A proposal for the second draft Recommendation of ITU-T X.sap-5: Guideline on anonymous authentication for e-commerce service     Electronics and Telecommunications Research Institute (ETRI)   Q7/17   2012-02-07
[ 598 ]  
 
Proposed content in X.ticvs: Technologies involved in countering voice spam in telecommunication organizations     China , China Unicom   Q5/17   2012-02-07
[ 597 ]  
 
Comments on X.ics: A practical reference model for countering email spam using botnet information     China   Q5/17   2012-02-07
[ 596 ]  
 
Proposal to establish a tutorial mechanism for new technologies     China   QALL/17   2012-02-07
[ 595 ]  
 
Updated text of X.msec-6: Security aspects of smartphones     China   Q6/17   2012-02-07
[ 594 ]  
 
Proposal on security requirements of digital distribution platforms of X.msec-6     China   Q6/17   2012-02-07
[ 593 ]  
 
Updated text of X.oacms: Overall aspects of countering mobile messaging spam     China   Q5/17   2012-02-07
[ 592 ]  
 
Proposal on changing the title name of X.msec-6 back to smartphone     China , China Unicom   Q6/17   2012-02-07
[ 591 ]  
 
Proposal of new security requirements for cloud based telecommunication service X.srfctse     Electronics and Telecommunications Research Institute (ETRI)   Q8/17   2012-02-07
[ 590 ]  
 
Proposal for new security requirements of social networking     Electronics and Telecommunications Research Institute (ETRI)   Q7/17   2012-02-07
[ 589 ]  
 
Security Protection of Customer Information in Telecom Operators     China Mobile Communications Corporation , ZTE Corporation   Q3/17   2012-02-07
[ 588 ]  
 
Authentication result transfer based on encrypted cookie for WLAN scenario     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 587 ]  
 
Interface of the abnormal traffic detection and control system     China Mobile Communications Corporation , Huawei Technologies Co. Ltd.   Q4/17   2012-02-07
[ 586 ]  
 
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 585 ]  
 
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"     China Mobile Communications Corporation   Q6/17   2012-02-07
[ 584 ]  
 
A Draft of Technology Involved in Countering Voice Spam-X.ticvs     China Mobile Communications Corporation   Q5/17   2012-02-07
[ 583 ]  
 
Authentication integration solution for WLAN scenario in X.authi.     China Mobile Communications Corporation , ZTE Corporation   Q10/17   2012-02-07
[ 582 ]  
 
Candidate Use Cases for Cloud Computing Security     Microsoft Corporation   Q8/17   2012-02-07
[ 581 ]  
(Rev.1) 
Proposed modifications to draft Supplement: Users' guide for ITU-T X.1051     KDDI Corporation   Q3/17   2012-02-07
[ 580 ]  
(Rev.1) 
Proposed text of Clause7.4 to draft Recommendation of X.giim     Ministry of Industry and Information Technology (MIIT)   Q10/17   2012-02-07
[ 579 ]  
(Rev.1) 
Proposal for refined text to draft Recommendation X.giim: Generic IdM interoperability mechanisms     Ministry of Industry and Information Technology (MIIT)   Q10/17   2012-02-07
[ 578 ]  
(Rev.1) 
Proposal on security requirements of ubiquitous networking in NGN     ZTE Corporation   Q6/17   2012-02-07
[ 577 ]  
(Rev.1) 
Revised text for chapter 14 in draft X.srfctse     ZTE Corporation   Q8/17   2012-02-07
[ 576 ]  
 
Propose a chapter on cloud security for X.srfctse     ZTE Corporation   Q8/17   2012-02-07
[ 575 ]  
(Rev.1) 
Proposal for a new work item on Framework of Detection, Tracking and Response of Mobile Botnets     China Unicom   Q7/17   2012-02-07
[ 574 ]  
 
Improving Intrusion Detection Systems with Hierarchical Architecture Using an Inter layer Messaging System     Ministry of Information and Communication Technology (MICT)   Q4/17   2012-02-07
[ 573 ]  
 
Key Pre-distribution Using Nonlinear Codes on Z4 for Mobile Ad Hoc Networks     Ministry of Information and Communication Technology (MICT)   Q1/17   2012-02-07
[ 572 ]  
 
 
Withdrawn
 
N/A (no se aplica)   Q4/17   2012-02-07
[ 571 ]  
 
A New Architecture for Redirecting Intruders to Honeypots     Ministry of Information and Communication Technology (MICT)   Q4/17   2012-02-07
[ 570 ]  
(Rev.1) 
Open identity trust framework - proposed changes     Microsoft Corporation   Q10/17   2012-02-07
[ 569 ]  
(Rev.1) 
Proposal of draft for X.atag     KDDI Corporation   Q10/17   2012-02-07
[ 568 ]  
 
Propose the requirement of cloud storage security for X.srfctse     ZTE Corporation   Q8/17   2012-02-07
[ 567 ]  
(Rev.1) 
Report of the Correspondence Group on COP17 (Child Online Protection/ITU-T SG17), September 2011-January 2012     Yaana Technologies, LLC   QALL/17   2012-02-06
[ 566 ]  
 
Proposed text for security guidelines chapter of X.ccsec     China Telecommunications Corporation   Q8/17   2012-02-06
[ 565 ]  
 
Proposed text for security challenges chapter of X.ccsec     China Telecommunications Corporation   Q8/17   2012-02-06
[ 564 ]  
 
Proposed new work item on Requirements and framework of operational security for Cloud Computing     China , China Telecommunications Corporation , ZTE Corporation   Q8/17   2012-02-06
[ 563 ]  
(Rev.1) 
Update proposal of X.p2p-4: Use of service providers' user authentication infrastructure to implement PKI for peer-to-peer networks     KDDI Corporation   Q7/17   2012-02-06
[ 562 ]  
(Rev.1) 
Proposal of a new work item "Secure application management framework for communication devices"     KDDI Corporation , Sony Corporation   Q6/17   2012-02-06
[ 561 ]  
(Rev.1) 
Comments on X.ticvs (Technologies involved in countering voice spam in telecommunications organizations)     KDDI Corporation   Q5/17   2012-02-06
[ 560 ]  
(Rev.1-2) 
Proposal on new appendix for X.msec-6     China , China Unicom   Q6/17   2012-02-06
[ 559 ]  
(Rev.1) 
The security threats of disclosure and congestion for ubiquitous networking     China Unicom   Q6/17   2012-02-06
[ 558 ]  
(Rev.1) 
The security threats of eavesdropping and tamper for ubiquitous networking     China Unicom   Q6/17   2012-02-06
[ 557 ]  
(Rev.1) 
The security threats of Denial of Service and abuse for ubiquitous networking     China Unicom   Q6/17   2012-02-06
Resultados :756 documentos
Resultados :  Anterior -  1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 - 15 - 16  - Siguiente Next
 
Telecarga de múltiples documentos: Marcar las casillas correspondientes a los documentos seleccionados, a continuación pulsar "Telecargar"
   
 
Preferencias del usuario: 
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):
Páginas de navegación HTML  
Formatos  + Otros formatos
Idiomas (máximo 2)  + Multilingüe  
(E: inglés - F: francés - S: español - A: árabe - C: chino - R: ruso)

Pruebe ITU Translate, la herramienta de traducción automática de documentos
Comienzo de la página -  Comentarios -  Contáctenos -  Copyright © UIT 2008 Reservados todos los derechos
Contacto público :  TSB EDH
Actualizado el : 2012-09-06