Contributions |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 67 ]
(Rev.1) |
Comments regarding X.ccsec
|
Canada
|
Q8/17
|
2013-04-03 |
|
[ 66 ]
(Rev.1) |
IdM requirements for X.idmcc chap7
|
China Mobile Communications Corporation
|
Q10/17
|
2013-04-03 |
|
[ 65 ]
(Rev.1) |
Comments regarding X.trm
|
Canada
|
Q4/17
|
2013-04-03 |
|
[ 64 ]
(Rev.1) |
IdM requirements for X.idmcc chap8
|
China Mobile Communications Corporation
|
Q10/17
|
2013-04-03 |
|
[ 63 ]
(Rev.1) |
Proposed edits to X.goscc
|
China Mobile Communications Corporation
|
Q8/17
|
2013-04-03 |
|
[ 62 ]
(Rev.1) |
Proposed modifications of ITU-T X.1544 (X.capec)
|
Canada
|
Q4/17
|
2013-04-03 |
|
[ 61 ]
(Rev.1) |
Comments on the latest draft of X.goscc
|
China Mobile Communications Corporation
|
Q8/17
|
2013-04-03 |
|
[ 60 ]
(Rev.1) |
Proposed modifications of ITU-T X.1526 (X.oval)
|
Canada
|
Q4/17
|
2013-04-03 |
|
[ 59 ]
(Rev.1) |
Proposal of new work item: Framework of on-demand cloud security
|
China Mobile Communications Corporation
|
Q8/17
|
2013-04-03 |
|
[ 58 ]
(Rev.1) |
Proposal to modify text of Question 8/17
|
Canada
|
Q8/17
|
2013-04-03 |
|
[ 57 ]
(Rev.1-2) |
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-04-03 |
|
[ 56 ]
(Rev.1) |
Revised text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2013-04-03 |
|
[ 55 ]
(Rev.1) |
An outline of global mobile malicious software trends
|
China Mobile Communications Corporation
|
Q6/17
|
2013-04-03 |
|
[ 54 ]
(Rev.1) |
Comments on X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
Ministry of Industry and Information Technology (MIIT)
|
Q5/17
|
2013-04-03 |
|
[ 53 ]
(Rev.1) |
New progress report on ICT Security Standards Roadmap Part 6: Identity Management (IdM) Landscape: IdM standards, organizations and gap analysis
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2013-04-03 |
|
[ 52 ]
(Rev.1) |
Proposal for revised draft text of X.bhsm: Telebiomtric authentication framework using biometric hardware security module
|
Korea (Rep. of)
|
Q9/17
|
2013-04-03 |
|
[ 51 ]
(Rev.1) |
Second draft of a guideline to technical and operational countermeasure for telebiometric applications using mobile devices
|
Korea (Rep. of)
|
Q9/17
|
2013-04-03 |
|
[ 50 ]
(Rev.1) |
A proposal for the 3rd revised text on draft Recommendation ITU-T X.sap-7: Technical capabilities of fraud detection and response for services with high assurance level requirements
|
Korea (Rep. of)
|
Q7/17
|
2013-04-03 |
|
[ 49 ]
(Rev.1) |
The 5th revised text for Draft Recommendation of X.tif: Integrated framework for telebiometric data protection in e-Health and telemedicine
|
Korea (Rep. of)
|
Q9/17
|
2013-04-03 |
|
[ 48 ]
(Rev.1) |
The 6th revised text of Recommendation ITU-T X.iptvsec-8: Virtual machine based security platform for renewable IPTV SCP
|
Korea (Rep. of)
|
Q6/17
|
2013-04-03 |
|
[ 47 ]
(Rev.1) |
6th draft text for Recommendation ITU-T X.sap-6: Non-repudiation framework based on a one time password
|
Korea (Rep. of)
|
Q7/17
|
2013-04-03 |
|
[ 46 ]
(Rev.1) |
Proposal of the 1st draft text for Recommendation ITU-T X.sap-9: Delegated non-repudiation architecture based on X.813
|
Korea (Rep. of)
|
Q7/17
|
2013-04-03 |
|
[ 45 ]
(Rev.1) |
Proposed revised text on draft Recommendation ITU-T X.msec-8 : Secure application distribution framework for communication devices
|
Korea (Rep. of)
|
Q6/17
|
2013-04-03 |
|
[ 44 ]
(Rev.1) |
Proposed revised text on draft Recommendation ITU-T X.sgsec-1: Security functional architecture for smart grid services using telecommunication network
|
Korea (Rep. of)
|
Q6/17
|
2013-04-03 |
|
[ 43 ]
(Rev.1) |
Proposal for the 2nd revised text on draft Recommendation ITU-T X.sisnego, framework of security information sharing negotiation
|
Korea (Rep. of)
|
Q4/17
|
2013-04-03 |
|
[ 42 ]
(Rev.1) |
proposal for the baseline text for Recommendation ITU-T X.sap-8: Efficient multi-factor authentication mechanisms using mobile devices
|
Korea (Rep. of)
|
Q7/17
|
2013-04-03 |
|
[ 41 ]
(Rev.1) |
A proposal for the 7th revised text on draft Recommendation ITU-T X.trm: Overview of traceback mechanisms
|
Korea (Rep. of)
|
Q4/17
|
2013-04-03 |
|
[ 40 ]
(Rev.1) |
A proposal for the 7th revised text on draft Recommendation ITU-T X.eipwa: Guideline on techniques for preventing web-based attacks
|
Korea (Rep. of)
|
Q4/17
|
2013-04-03 |
|
[ 39 ]
(Rev.1) |
A proposal for the 2nd revised text for Recommendation ITU-T X.gpim, Guideline for management of personally identifiable information for telecommunication organizations
|
Korea (Rep. of)
|
Q3/17, Q10/17
|
2013-04-03 |
|
[ 38 ]
(Rev.1) |
Assignment of default approval process to Questions of SG 17
|
Korea (Rep. of)
|
QALL/17
|
2013-04-03 |
|
[ 37 ]
(Rev.1) |
A proposal for the 7th revised text of Recommendation ITU-T X.csi: Guidelines for cybersecurity index
|
Korea (Rep. of)
|
Q4/17
|
2013-04-03 |
|
[ 36 ]
(Rev.1) |
Proposal for revised text of X.giim
|
Ministry of Industry and Information Technology (MIIT)
|
Q10/17
|
2013-04-03 |
|
[ 35 ]
|
Proposal for new clause structure for X.msec-8: Secure application distribution framework for communication devices
|
KDDI Corporation
|
Q6/17
|
2013-04-03 |
|
[ 34 ]
|
Proposal on introduction of verification process for cryptographic protocols while making ITU-T Recommendations
|
KDDI Corporation
,
National Institute of Information and Communications Technology (NICT)
|
Q1/17
|
2013-04-03 |
|
[ 33 ]
(Rev.1) |
Comments on draft X.ccsec (TD181)
|
United States
|
Q8/17
|
2013-04-02 |
|
[ 32 ]
|
Guidance for Providing Trust and Security for e-Government Public Services on the base of IdM
|
Russian Federation
|
Q10/17
|
2013-04-02 |
|
[ 31 ]
|
Guidance for management of personally identifiable information for telecommunication organizations
|
Russian Federation
|
Q3/17
|
2013-04-02 |
|
[ 30 ]
|
Extended level of information security of network operators
|
Russian Federation
|
Q4/17, Q3/17, Q2/17, Q10/17, Q1/17
|
2013-04-02 |
|
[ 29 ]
|
This contribution proposes a split of cloud computing security work between SG17 and SG13
|
Russian Federation
|
Q8/17
|
2013-04-02 |
|
[ 28 ]
(Rev.1) |
Proposed text for security audit of X.goscc
|
China Telecommunications Corporation
|
Q8/17
|
2013-04-02 |
|
[ 27 ]
(Rev.1) |
Proposed revised text for security SLA requirements of X.goscc
|
China Telecommunications Corporation
|
Q8/17
|
2013-04-02 |
|
[ 26 ]
|
Draft Recommendation ITU-T X.cybex-tp, Transport protocols supporting cybersecurity information exchange
|
National Institute of Information and Communications Technology (NICT)
|
Q4/17
|
2013-04-02 |
|
[ 25 ]
(Rev.1) |
Proposed Edits to clause 8.10, 8.11&8.12 in X.sfcse
|
Ministry of Industry and Information Technology (MIIT)
|
Q8/17
|
2013-04-02 |
|
[ 24 ]
(Rev.1) |
Proposal for Division of Cloud Security Work Between SG13 and SG17
|
United States
|
QALL/17
|
2013-04-01 |
|
[ 23 ]
(Rev.1) |
Proposed derivation method of SaaS security architecture for X.sfcse
|
China Telecommunications Corporation
|
Q8/17
|
2013-04-01 |
|
[ 22 ]
(Rev.1) |
Proposed revised SaaS security requirements for X.sfcse
|
China Telecommunications Corporation
|
Q8/17
|
2013-04-01 |
|
[ 21 ]
(Rev.1) |
Implementing Information Management and Security Policy within the RGoB
|
Ministry of Information and Communications, Bhutan
|
Q2/17
|
2013-04-01 |
|
[ 20 ]
|
Proposal for a new work item: Technical Framework for Countering Mobile Messaging Spam
|
China Unicom
|
Q5/17
|
2013-03-31 |
|
[ 19 ]
|
Supplement of Security Requirements of the Individual Information Service for Operators
|
China Unicom
|
Q2/17
|
2013-03-31 |
|
[ 18 ]
(Rev.1) |
Informal guidelines for Correspondence Group transparency and balance
|
Yaana Technologies, LLC
|
QALL/17
|
2013-03-30 |
Results:617 total items. Result page:
Previous -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):