Contribuciones |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 306 ]
+Add.1 |
Draft revisions to Recommendation Z.150 (02/03) User Requirements Notation (URN) - Language requirements and framework
|
Canada
|
Q14/17, Q13/17, Q12/17
|
2010-11-25 |
|
[ 305 ]
|
UK Comments on X.673
|
UK
|
Q12/17
|
2010-11-26 |
|
[ 304 ]
|
Editorial changes on draft Rec. ITU-T X.673 (COM 17-R22) under TAP
|
France Telecom Orange
|
Q12/17
|
2010-11-25 |
|
[ 303 ]
|
Proposal for revised text of clauses 6, 6.3, 7.3.3, and 8.3 in X.iptvsec-3: Key management framework for secure IPTV services
|
Deutsche Telekom AG
|
Q6/17
|
2010-11-25 |
|
[ 302 ]
|
Trust management evaluation criteria of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 301 ]
|
Trust management assumption of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 300 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 299 ]
|
Proposal of a baseline model for clause 11 of X.sap-4
|
Hitachi, Ltd
|
Q7/17, Q10/17
|
2010-11-25 |
|
[ 298 ]
|
Germany's comments on the draft new Recommendation X.tcs-2
|
Germany
|
Q5/17
|
2010-11-25 |
|
[ 297 ]
|
Proposal for modification on ITU-T Recommendation ITU-T X.1500 [X.cybex], Cybersecurity information exchange framework
|
Germany
|
Q4/17
|
2010-11-25 |
|
[ 296 ]
|
Proposal of a new work item for the general framework of device authentication in peer-to-peer communications
|
KDDI Corporation
|
Q7/17
|
2010-11-25 |
|
[ 295 ]
|
Comments for draft Recommendation X.msec-6: Security aspects of mobile phones
|
KDDI Corporation
|
Q6/17
|
2010-11-25 |
|
[ 294 ]
|
Survey of Standardizing in ISO/TC 215 for X.tif
|
Japan
|
Q9/17
|
2010-11-25 |
|
[ 293 ]
|
Technical contributions for ITU-T draft Recommendation X.gep: A guideline for evaluating telebiometric template protection techniques
|
Japan
|
Q9/17
|
2010-11-25 |
|
[ 292 ]
|
A draft proposed text for Recommendation ITU-T X.sgsm, Information security management guidelines for small and medium telecommunication organizations
|
Japan
|
Q3/17
|
2010-11-25 |
|
[ 291 ]
|
Comments on the draft Recommendation X.tcs-2: Real-time blocking list (RBL)-based framework for countering VoIP spam
|
NICT
|
Q5/17
|
2010-11-25 |
|
[ 290 ]
|
Challenges to open networks: what strategies? Development of a "defense in depth" regulatory framework
|
Information and Communication Technologies
,
Authority of Mauritius
|
Q4/17
|
2010-11-22 |
|
[ 289 ]
(Rev.1) |
Comments on draft Rec. ITU-T X.1275 (COM 17-R21) under TAP
|
France Telecom Orange
|
Q10/17
|
2010-11-11 |
|
[ 288 ]
|
Enhancing Cybersecurity for Future Networks: automated security use case
|
Yaana Technologies, LLC
|
Q4/17
|
2010-11-09 |
|
[ 287 ]
(Rev.1) |
Revised version of Rec. ITU-T X.660
|
France Telecom Orange
|
Q12/17, Q11/17
|
2010-11-08 |
|
[ 286 ]
|
Proposed draft Recommendation ITU-T X.ssaf, Security standards availability framework
|
Yaana Technologies, LLC
|
Q4/17
|
2010-11-05 |
|
[ 285 ]
|
Comments on draft Rec. ITU-T X.1032 (COM 17-R15) under TAP
|
France Telecom Orange
|
Q2/17
|
2010-10-11 |
|
[ 284 ]
|
Amendments to draft ITU-T Recommendation X.673
|
UK
|
Q12/17
|
2010-09-09 |
|
[ 283 ]
|
ITU-T & ISO Collaboration
|
Canada
|
Q10/17
|
2010-10-07 |
|
[ 282 ]
|
The offer on working out of the new Recommendation representing base rules on creation of system of protection of telecommunication operators from revenue leakage. "Revenue leakage protection"
|
Ministry of Communication and
,
Informatization of the Russian Federation
|
Q1/17
|
2010-04-01 |
|
[ 281 ]
(Rev.1) |
Proposal of new work item to develop a communication protocol between applications for additional information of content in inappropriate content protection systems
|
Telecommunications Administration of Russian Federation
|
Q7/17
|
2010-04-01 |
|
[ 280 ]
|
Privacy (Data Protection). Personal Information Management System - Requirements for Telecommunications (PIMS-T)
|
Telecommunications Administration of Russian Federation
|
Q3/17
|
2010-04-01 |
|
[ 279 ]
|
National network security center (NNSC) for IP-based public networks in developing countries
|
Telecommunications Administration of Russian Federation
|
Q3/17
|
2010-04-01 |
|
[ 278 ]
|
Proposal of a new work item on creation of decentralized name resolution system architecture for global IP-networks
|
Telecommunications Administration of Russian Federation
|
Q12/17, Q10/17
|
2010-04-01 |
|
[ 277 ]
|
New Work Item Proposal on security challenge analysis for cloud computing
|
CATR, MIIT, China
|
Q8/17
|
2010-03-29 |
|
[ 276 ]
|
UK comments on the progression of ITU-T X.oid-res and related documents
|
UK
|
Q12/17
|
2010-03-29 |
|
[ 275 ]
|
UK comments on the Proposed text for ITU-T X.oid-res - Supplement on procedures for the operation of the .oid-res.org maintenance agency
|
UK
|
Q12/17
|
2010-03-29 |
|
[ 274 ]
|
Proposed changes to TD 0771, ballot text for ISO/IEC 29168 (Draft Recommendation ITU-T X.oid-res)
|
UK
|
Q12/17
|
2010-03-29 |
|
[ 273 ]
|
Proposal for revised text of clause 7 in X.iptvsec-4: Algorithm selection scheme for SCP descrambling
|
ETRI
|
Q6/17
|
2010-03-29 |
|
[ 272 ]
|
Proposal for new Annex I Terminal device provisioning for X.iptvsec-4: Algorithm select scheme for SCP descrambling
|
ETRI
|
Q6/17
|
2010-03-29 |
|
[ 271 ]
|
Proposal for new Annex II secure storing SCP Client in X.iptvsec-4: Algorithm select scheme for SCP descrambling
|
ETRI
|
Q6/17
|
2010-03-29 |
|
[ 270 ]
|
Comments on generic IdM interoperability mechanism
|
KDDI Corporation
|
Q10/17
|
2010-03-29 |
|
[ 269 ]
|
X.handle; Infrastructure for Interoperability of Heterogeneous Information Systems
|
Corporation for National Research Initiatives
|
Q12/17, Q10/17
|
2010-03-29 |
|
[ 268 ]
|
Security coordination
|
France
|
QALL/17
|
2010-03-29 |
|
[ 267 ]
(Rev.1) |
A proposal on studying security requirements and framework of cloud based telecommunication service environment
|
ZTE Corporation, CATR, MIIT
|
Q8/17
|
2010-03-26 |
|
[ 266 ]
|
User authentication mechanism of X.p2p-3
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 265 ]
|
Updated text of X.msec-6: Overview aspects of mobile phones
|
MIIT, China
|
Q6/17
|
2010-03-26 |
|
[ 264 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 263 ]
|
Proposed text in section 7 of X.tcs-1
|
MIIT, China
|
Q5/17
|
2010-03-26 |
|
[ 262 ]
|
A Proposal of setting up new work item: Supported Spam Filter Datasets for ICSG
|
MIIT, China
|
Q5/17
|
2010-03-26 |
|
[ 261 ]
|
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 260 ]
|
Proposed draft Rec. X.ismf, Information security management framework
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 259 ]
|
Proposal for changing the title name of X.msec-6 from "smart phone" to "mobile phone"
|
MIIT, China
|
Q6/17
|
2010-03-26 |
|
[ 258 ]
|
Proposal for a new work item on Overall Aspects of Countering Messaging Spam in Mobile Networks
|
MIIT, China
|
Q5/17
|
2010-03-26 |
|
[ 257 ]
|
Organization and Personnel part in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
Resultados :756 documentos Resultados :
Anterior -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):