Contribuciones |
|
Número
|
Título
|
Origen
|
AI/Cuestión
|
Fecha
|
|
[ 56 ]
|
Proposal for the 1st draft of Recommendation X.isg: Information security governance for telecommunications organizations
|
Korea
|
Q3/17
|
2009-02-02 |
|
[ 55 ]
|
Updated draft text on Recommendation X.tb-ucc : Traceback use cases and capabilities
|
Korea
|
Q4/17
|
2009-02-02 |
|
[ 54 ]
|
Proposal for the third draft text on Recommendation X.iptvsec-3 : Key management framework for secure IPTV services
|
Korea
|
Q6/17
|
2009-02-02 |
|
[ 53 ]
|
Proposal for the first draft text of Recommendation X.1034, Amd. 1 : Guideline on extensible authentication protocol based authentication and key management in a data communication network
|
Korea
|
Q2/17
|
2009-02-02 |
|
[ 52 ]
|
Proposal for the second revised draft text of Recommendation X.usnsec-1 : Security framework for ubiquitous sensor network
|
Korea
|
Q6/17
|
2009-02-02 |
|
[ 51 ]
|
Proposal for revised draft Recommendation of X.ott : Authentication framework with one-time telebiometric template
|
Korea
|
Q9/17
|
2009-02-02 |
|
[ 50 ]
|
Check-list for Recommendation X.iptvsec-2
|
Korea
|
Q6/17
|
2009-02-02 |
|
[ 49 ]
|
Proposed text for Appendix to Recommendation X.iptvsec-2
|
Korea
|
Q6/17
|
2009-02-02 |
|
[ 48 ]
|
Relation between X.iptvsec-2 and X.iptvsec-54
|
Korea
|
Q6/17
|
2009-02-02 |
|
[ 47 ]
|
Proposal of a first draft text for X.tcs-2: Technical means for countering VoIP spam
|
Korea
|
Q5/17
|
2009-02-02 |
|
[ 46 ]
|
Modification of chapter 13 and Appendix I of draft Recommendation X.fcsip
|
Korea
|
Q5/17
|
2009-02-02 |
|
[ 45 ]
|
Text on authentication assurance for consideration in drafting Recommendation X.eaa
|
United States of America
|
Q10/17
|
2009-02-02 |
|
[ 44 ]
|
Considering approval of the CA/Browser Forum specification for extended validation certificates as an ITU-T Recommendation
|
VeriSign
|
Q4/17, Q12/17, Q11/17, Q10/17
|
2009-02-02 |
|
[ 43 ]
|
Proposed Amendment to Recommendation X.1082
|
UK
|
Q9/17
|
2009-02-02 |
|
[ 42 ]
|
Proposed Amendment to Recommendation X.1081
|
UK
|
Q9/17
|
2009-02-02 |
|
[ 41 ]
|
Comments on ITU-T draft Recommendation X.1251
|
UK
|
Q10/17
|
2009-02-02 |
|
[ 40 ]
|
Comments on draft ITU-T Recommendation X.1250
|
UK
|
Q10/17
|
2009-02-02 |
|
[ 39 ]
|
Comments on Rec. ITU-T X.1191 under TAP consultation
|
France Telecom
|
Q6/17
|
2009-02-02 |
|
[ 38 ]
|
Comments on Rec. ITU-T X.1251 under TAP consultation
|
France Telecom
|
Q10/17
|
2009-02-02 |
|
[ 37 ]
|
Comments on Rec. ITU-T X.1250 under TAP consultation
|
France
|
Q10/17
|
2009-02-02 |
|
[ 36 ]
|
Changes on the proposed new structure for SG 17
|
France
|
QALL/17
|
2009-02-02 |
|
[ 35 ]
|
Entity authentication assurance - The ecosystem and framework for Rec. X.eaa
|
VeriSign
|
Q10/17
|
2009-01-30 |
|
[ 34 ]
|
Comments on Rec. ITU-T X.1171 under TAP consultation
|
France
|
Q6/17
|
2009-01-30 |
|
[ 33 ]
|
Input to X.eaa: Mapping European IDABC Authentication Levels to SAML 2.0 - Gap analysis and recommendations
|
CE (ENISA)
|
Q10/17
|
2009-01-30 |
|
[ 32 ]
(Rev.1) |
Comments on draft Recommendation X.1191 (X.iptvsec-1) Functional requirements and architecture for IPTV security aspects
|
Deutsche Telekom
|
Q6/17
|
2009-01-30 |
|
[ 31 ]
|
Clarification proposal of scope and requirements in X.iptvsec-2.
|
NTT
,
Softbank BB
|
Q6/17
|
2009-01-30 |
|
[ 30 ]
|
Assignment of default approval procedures to Questions of SG 17
|
Germany
|
QALL/17
|
2009-01-30 |
|
[ 29 ]
(Rev.1) |
Amendment to draft Recommendation X.1251 (X.idif)
|
Germany
|
Q10/17
|
2009-01-30 |
|
[ 28 ]
|
Proposal of the new discussion item for telebiometrics - Evaluation framework for protection techniques of biometric template
|
Japan
|
Q9/17
|
2009-01-30 |
|
[ 27 ]
|
Proposal on expanding the scope of the study related to X.sap-3 (management framework for one time password (OTP) based authentication service)
|
Japan
|
Q7/17
|
2009-01-30 |
|
[ 26 ]
|
Comments related to draft Rec. X.msec-5
|
France Telecom
|
Q6/17
|
2009-02-03 |
|
[ 25 ]
|
Proposed changes to the text of Q.6 "Security aspects of ubiquitous telecommunication services"
|
France Telecom
|
Q6/17
|
2009-02-03 |
|
[ 24 ]
|
Comments on draft new Recommendation ITU-T X.1251 (X.idif - A framework for user control of digital identity) (COM 17-R 47)
|
Canada
|
Q10/17
|
2009-02-03 |
|
[ 23 ]
|
Comments on draft new Recommendation ITU-T X.1250 (X.idmreq - Capabilities for enhanced global identity management trust and interoperability) (COM 17-R 46)
|
Canada
|
Q10/17
|
2009-02-03 |
|
[ 22 ]
|
Recommendation that SG 17 continue the Joint Coordination Activity on Conformance and Interoperability Testing (JCA-CIT)
|
Canada
|
QALL/17
|
2009-02-03 |
|
[ 21 ]
|
Comments on draft new Recommendation ITU-T X.1191 (X.iptvsec-1 - Functional requirements and architecture for IPTV security aspects) (COM 17-R 44)
|
Canada
|
Q6/17
|
2009-02-03 |
|
[ 20 ]
(Rev.1) |
Proposal for the first draft text of X.msec-5 : Security aspects of mobile multi-homed communications
|
ETRI
|
Q6/17
|
2009-01-30 |
|
[ 19 ]
|
First draft proposal for X.sap-3: Guidelines for the management framework of OTP-based authentication services
|
ETRI
|
Q7/17
|
2009-01-30 |
|
[ 18 ]
|
Suggestion of adding new subsection items and modifications to existing subsections for the section 7 "interoperable SCP framework" appeared on the draft text of X.iptvsec-5
|
ETRI
|
Q7/17, Q6/17
|
2009-01-30 |
|
[ 17 ]
|
Scenarios of SCP-B or SCP-IX deployed in IPTV Terminal Device
|
ETRI
|
Q7/17, Q6/17
|
2009-01-30 |
|
[ 16 ]
|
Proposed draft Rec.X.p2p-3, Security guideline of P2P-based telecommunication network
|
China Mobile
,
MII China
,
ZTE
|
Q7/17
|
2009-01-29 |
|
[ 15 ]
|
Proposed draft Rec.X.abnot, Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile
,
Huawei
,
ZTE
|
Q4/17
|
2009-01-29 |
|
[ 14 ]
(Rev.1) |
Proposal for procedure of abnormal traffic detection and control system
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 13 ]
(Rev.1) |
Proposal for framework of abnormal traffic detection and control system
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 12 ]
|
Proposal on general policy profile for network security
|
ZTE
,
China Mobile
|
Q4/17
|
2009-01-29 |
|
[ 11 ]
|
An overview of algorithms used in anomaly detection
|
Huawei
|
Q4/17
|
2009-02-02 |
|
[ 10 ]
|
Countering spam technologies
|
Huawei Technologies
|
Q5/17
|
2009-01-28 |
|
[ 9 ]
|
Input for draft X.eaa
|
Telcordia Technologies
|
Q10/17
|
2009-01-28 |
|
[ 8 ]
|
Input for draft X.eaa - Identity Proofing
|
Telcordia Technologies
|
Q10/17
|
2009-01-28 |
|
[ 7 ]
|
Comments on draft Rec. ITU-T X.rfpg
|
France Telecom
|
Q10/17
|
2009-01-28 |
Resultados :756 documentos Resultados :
Anterior -
1 -
2 -
3 -
4 -
5 -
6 -
7 -
8 -
9 -
10 -
11 -
12 -
13 -
14 -
15 -
16
- Siguiente
|
Telecarga de múltiples documentos: Formatos e idiomas que hay que tener en cuenta (si están disponibles):