Documentos Temporales
(PLEN)
|
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 1151-PLEN ]
|
Proposed ITU Workshop on Machine learning and cybersecurity
|
Q1/17 Rapporteur
|
Q1/17
|
2018-03-26 |
|
[ 1150-PLEN ]
|
LS/o on Collaboration and liaison relationship with ITU-D Study Group 2, Question 3/2 [to ITU-T SG2]
|
ITU-T SG17
|
Q1/17
|
2018-03-26 |
|
[ 1149-PLEN ]
(Rev.1) |
LS/o on Telecommunication Management and OAM Project Plan [to ITU-T SG2]
|
ITU-T SG17
|
Q1/17
|
2018-03-26 |
|
[ 1148-PLEN ]
|
5G Security in SG17 and Proposed Way Forward
|
Q6/17 Rapporteur
|
Q6/17
|
2018-03-26 |
|
[ 1147-PLEN ]
(Rev.1) |
New work item proposal for telebiometric authentication using speaker recognition
|
Q9/17 Rapporteur
|
Q9/17
|
2018-03-26 |
|
[ 1146-PLEN ]
(Rev.1-2) |
LS/o on IoT related activities in ITU-T SG17 [to ISO/IEC JTC 1/SC 27/WG4]
|
ITU-T SG17
|
Q6/17
|
2018-03-26 |
|
[ 1145-PLEN ]
(Rev.1-2) |
LS/o on "Update the progress on using Identity Based Cryptography for IoT services Over Telecom networks" to [IETF SAAG, ETSI/TC CYBER, ISO/SC 27/WG2
|
ITU-T SG17
|
Q6/17
|
2018-03-26 |
|
[ 1144-PLEN ]
|
Comments to the 3rd session of CG-XSS
|
CG-XSS Co-Conveners
|
QALL/17
|
2018-03-26 |
|
[ 1143-PLEN ]
(Rev.1-2) |
The new baseline document of X.grm
|
Editors
|
Q3/17
|
2018-03-26 |
|
[ 1142-PLEN ]
|
Potential study topics on 5G security
|
Q6/17 Rapporteur
|
Q6/17
|
2018-03-26 |
|
[ 1141-PLEN ]
|
Revised baseline text of draft ITU-T X.orf-gs, "OID-based resolution framework for IoT group services"
|
Editors
|
Q11/17
|
2018-03-26 |
|
[ 1140-PLEN ]
|
New work item proposal for the draft ITU-T Recommendation X.mdcv, security-related misbehaviour detection mechanism based on big data analysis for connected vehicles
|
Q13/17 Rapporteur
|
Q13/17
|
2018-03-26 |
|
[ 1139-PLEN ]
|
The 1st baseline text for X.sfop: Security framework of open platform for FinTech services
|
Editors
|
Q7/17
|
2018-03-26 |
|
[ 1138-PLEN ]
(Rev.1) |
X.1214 (X.samtn), Security assessment techniques in telecommunication/ICT networks (for TAP approval)
|
Editors
|
Q4/17
|
2018-03-26 |
|
[ 1137-PLEN ]
|
The revised text for ITU-T X.ucstix, Use Cases for Structured Threat Information Expression (STIX)
|
Editors
|
Q4/17
|
2018-03-26 |
|
[ 1136-PLEN ]
(Rev.1) |
LS/o on new work item "X.fgati: Framework and Guidelines for Applying Threat Intelligence in Telecom Network Operation" [to OASIS CTI TC]
|
ITU-T SG17
|
Q4/17
|
2018-03-26 |
|
[ 1135-PLEN ]
|
Q2/17 updates to Report of SG17 activities in implementation of PP-14 Resolutions
|
TSB
|
QALL/17, Q1/17
|
2018-03-26 |
|
[ 1134-PLEN ]
|
Report of Q2/17 and Q7/17 session on middlebox security
|
Q2/17 Rapporteur, Q7/17 Rapporteur
|
Q7/17, Q2/17
|
2018-03-26 |
|
[ 1133-PLEN ]
(Rev.1-2) |
LS/o about ongoing ITU-T Q2/17 and Q6/17 works on security aspects for the software-defined networking [to ITU-T SG13/JCA-SDN]
|
ITU-T SG17
|
Q6/17, Q2/17
|
2018-03-26 |
|
[ 1132-PLEN ]
|
The 6th revised baseline text for X.websec-7: A reference monitor for online analytics services
|
Editors
|
Q7/17
|
2018-03-26 |
|
[ 1131-PLEN ]
(Rev.1-3) |
LS/o on new work item "X.5Gsec-q: Security guidelines for applying quantum-safe algorithms in 5G systems"
|
ITU-T SG17
|
Q6/17
|
2018-03-26 |
|
[ 1130-PLEN ]
|
LS/o on ongoing ITU-T Q2/17 works on security aspects for the service function chain [to IETF SFC WG]
|
ITU-T SG17
|
Q2/17
|
2018-03-26 |
|
[ 1129-PLEN ]
|
Revision of draft Recommendation X.sdnsec-1: Security services using the software-defined networking
|
Editors
|
Q6/17
|
2018-03-26 |
|
[ 1128-PLEN ]
(Rev.1-3) |
Revised Proposal for new work item on "Security guidelines for applying quantum-safe algorithms in 5G systems"
|
Q6/17 Rapporteur
|
Q6/17
|
2018-03-26 |
|
[ 1127-PLEN ]
(Rev.1-3) |
Revised text of Rec. X.1080.1
|
Editors
|
Q9/17
|
2018-03-26 |
|
[ 1126-PLEN ]
(Rev.1-2) |
Corrigendum 1 to Rec. ITU-T X.1080.0
|
Editors
|
Q9/17
|
2018-03-26 |
|
[ 1125-PLEN ]
(Rev.1) |
Draft Recommendation ITU-T X.1252 Baseline identity management terms and definitions
|
Editors
|
Q10/17
|
2018-03-26 |
|
[ 1124-PLEN ]
|
Updated scope of X.1254rev
|
Editors
|
Q10/17
|
2018-03-26 |
|
[ 1123-PLEN ]
|
Slide set used in 2nd special session of transformation of security study
|
CG-XSS Co-Convenors
|
QALL/17
|
2018-03-26 |
|
[ 1122-PLEN ]
|
LS/i on FIDO Alliance application for ITU-T A.5 Qualification and standards submissions [from FIDO Alliance]
|
FIDO Alliance
|
Q10/17
|
2018-03-26 |
|
[ 1121-PLEN ]
(Rev.1-2) |
Proposal for Q4/17 to host the incubation role and mechanism
|
Co-Convenors, CG-XSS
|
QALL/17, Q4/17
|
2018-03-26 |
|
[ 1120-PLEN ]
|
Report for the joint session of Q10/17, Q11/17 and Q14/17
|
Q10/17 Rapporteur, Q11/17 Rapporteur, Q14/17 Rappo
|
Q14/17, Q11/17, Q10/17
|
2018-03-26 |
|
[ 1119-PLEN ]
(Rev.1) |
Revised Proposal for new work item: Framework and Guidelines for Applying Threat Intelligence in Telecom Network Operation
|
Q4/17 Rapporteur
|
Q4/17
|
2018-03-26 |
|
[ 1118-PLEN ]
|
The revised baseline text of X.sradlt, Security Framework for Distributed Ledger Technology
|
Editors
|
QALL/17, Q14/17
|
2018-03-26 |
|
[ 1117-PLEN ]
|
Assessment methodology for DLT Treat landscape
|
Q14/17 Rapporteur
|
Q14/17
|
2018-03-26 |
|
[ 1116-PLEN ]
(Rev.1) |
Revised baseline text for draft Recommendation ITU-T X.hakm: Guidelines on hybrid authentication and key management mechanisms in client-server model
|
Editors
|
Q7/17
|
2018-03-25 |
|
[ 1115-PLEN ]
(Rev.1) |
Revised Proposal for new work item on "X.SDSec: Guideline on Software-defined Security in Software-defined Networking/Network Function Virtualization Network"
|
Q2/17 Rapporteur
|
Q2/17
|
2018-03-25 |
|
[ 1114-PLEN ]
(Rev.1-3) |
A.1 justification and baseline document for a new work item, X.tf-spd-dlt " Technical Framework for Secure Software Programme Distribution Mechanism Based on Distributed Ledger Technology"
|
Q14/17 Rapporteur
|
Q14/17
|
2018-03-25 |
|
[ 1113-PLEN ]
(Rev.1) |
The 7th revised text for ITU-T X.sup-gpim, Code of practice for personally identifiable information protection for telecommunications organizations (for agreement)
|
Editors
|
Q3/17
|
2018-03-25 |
|
[ 1112-PLEN ]
(Rev.1) |
Final draft for Recommendation ITU-T X.voltesec-1: Security framework for voice-over-long-term-evolution (VoLTE) network operation (for consent)
|
Editors
|
Q2/17
|
2018-03-25 |
|
[ 1111-PLEN ]
(Rev.1) |
New base text of Recommendation ITU-T X.sgtBD: Security guidelines of lifecycle management for telecom Big Data
|
Editors
|
Q8/17
|
2018-03-25 |
|
[ 1110-PLEN ]
(Rev.1) |
Revised baseline text for draft Recommendation ITU-T X.sct-dlt: Security capabilities of, and threats to Distributed Ledger Technology
|
Editors
|
Q14/17
|
2018-03-25 |
|
[ 1109-PLEN ]
|
New baseline text of draft Recommendation ITU-T X.nb-iot: Security Requirements and Framework for Narrow Band Internet of Things
|
Editors
|
Q6/17
|
2018-03-25 |
|
[ 1108-PLEN ]
(Rev.1) |
The new baseline document of X.SRCaaS
|
Editors
|
Q8/17
|
2018-03-25 |
|
[ 1107-PLEN ]
|
Recommendation X.1500 (2011) Amendment 12, Overview of cybersecurity information exchange (CYBEX), (for approval)
|
Convenor, CG-CYBEX
|
Q4/17
|
2018-03-25 |
|
[ 1106-PLEN ]
|
Proposal for new work item on "Security Requirements and Framework for IoT Service Platform"
|
Q6/17 Rapporteur
|
Q6/17
|
2018-03-25 |
|
[ 1105-PLEN ]
(Rev.1) |
LS/o on 'Technical framework of PII (Personally Identifiable Information) handling system in IoT environment' [to ISO/IEC JTC 1/SC 27/WG5]
|
ITU-T SG17
|
Q6/17
|
2018-03-25 |
|
[ 1104-PLEN ]
(Rev.1) |
LS/o on ' Introduction of the latest activities on IoT security in ITU-T SG 17 ' [to ITU-T SG 20, oneM2M, JCA-IoT]
Withdrawn - replaced by TD1188 and TD1189
|
ITU-T SG17
|
Q6/17
|
2018-03-25 |
|
[ 1103-PLEN ]
|
First baseline text for X.itssec-5, security guidelines for vehicular edge computing
|
Editors
|
Q13/17
|
2018-03-25 |
|
[ 1102-PLEN ]
|
New baseline text of draft Recommendation ITU-T X.tfss: Technical Framework for Security Services Provided by Operators
|
Editors
|
Q7/17
|
2018-03-25 |
Resultados :395 documentos Resultados :
Anterior -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):