Contributions
[ Source: China Mobile Communications Corporation ] |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 605 ]
|
Proposal for a new work item: Technical Framework for Countering Telephone Fraud
|
China
,
China Mobile Communications Corporation
,
China Unicom
|
Q5/17
|
2016-08-16 |
|
[ 576 ]
(Rev.1) |
Proposed new work item-- Guidelines on security of big data platform services in cloud computing
|
China
,
China Mobile Communications Corporation
|
Q8/17
|
2016-08-16 |
|
[ 574 ]
|
Proposal for a new work item on Security Requirements of Network as a Service (NaaS) in Cloud Computing
|
China Mobile Communications Corporation
,
China Unicom
|
Q8/17
|
2016-08-16 |
|
[ 565 ]
(Rev.1-2) |
Proposal for a new work item: Risk control on the assets accessible by the internet for the telecommunication organizations
|
China Mobile Communications Corporation
,
China Unicom
|
Q3/17
|
2016-08-15 |
|
[ 564 ]
(Rev.1-2) |
Proposal for a new work item: Security requirements for communication as a service application environments
|
China
,
China Mobile Communications Corporation
|
Q8/17
|
2016-08-15 |
|
[ 563 ]
(Rev.1-3) |
Applying for the agreement of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE, supplement to X.1245
|
China Mobile Communications Corporation
,
China Unicom
|
Q5/17
|
2016-08-15 |
|
[ 562 ]
(Rev.1-3) |
The finalized draft for determination of X.msec-11: Guidelines on mitigating the negative effects of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2016-08-15 |
|
[ 561 ]
(Rev.1) |
Proposed baseline text of Section 8.1-8.3 of threats analysis in X.websec-8(Security protection guidelines of value-added service for telecommunication operators)
|
China Mobile Communications Corporation
|
Q7/17
|
2016-08-15 |
|
[ 560 ]
|
Proposal for the 4th revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Unicom
,
ZTE Corporation
|
Q6/17, Q2/17
|
2016-08-14 |
|
[ 544 ]
|
Proposal for a new work item to ITU-T Recommendation X DSMM
|
Alibaba China Co. Ltd.
,
China Mobile Communications Corporation
,
China Unicom
,
ZTE Corporation
|
Q2/17, (Q3/17)
|
2016-03-01 |
|
[ 526 ]
|
Proposed new work item on Security Framework for VoLTE Operation
|
China Mobile Communications Corporation
|
Q2/17
|
2016-02-29 |
|
[ 496 ]
(Rev.1-2) |
Proposed control measures in X.websec-8 (Security protection guidelines of value-added service for telecommunication operators)
|
China Mobile Communications Corporation
|
Q7/17
|
2016-02-27 |
|
[ 495 ]
(Rev.1-3) |
The 3rd draft of X.ticsc: Technical measures and mechanisms on countering spoofed calls in the terminating network of voice over long term evolution (VoLTE), supplement to X.1245
|
China Mobile Communications Corporation
|
Q5/17
|
2016-02-27 |
|
[ 494 ]
(Rev.1-2) |
A proposal of new work item: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2016-02-27 |
|
[ 477 ]
|
Proposal for the 2nd revised text for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Unicom
,
ZTE Corporation
|
Q2/17
|
2016-02-23 |
|
[ 446 ]
|
2nd draft of X.ticsc: Technical measures and mechanism on countering the spoofed call in the terminating network of VoLTE
|
China Mobile Communications Corporation
|
Q5/17
|
2015-08-26 |
|
[ 425 ]
(Rev.1) |
Security reference architecture for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q2/17
|
2015-08-25 |
|
[ 424 ]
|
Security threats and security requirements for SDN Resource-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q2/17
|
2015-08-25 |
|
[ 423 ]
|
Security threats and security requirements for SDN Application-Control Interface for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking.
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q2/17
|
2015-08-25 |
|
[ 422 ]
|
Security threats and security requirements for SDN Resource Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q2/17
|
2015-08-25 |
|
[ 421 ]
|
Security threats and security requirements for SDN Control Layer for draft Recommendation X.sdnsec-2: Security requirements and reference architecture for software-defined networking
|
Alcatel-Lucent Shanghai Bell
,
China Mobile Communications Corporation
,
China Telecommunications Corporation
,
ZTE Corporation
|
Q2/17
|
2015-08-25 |
|
[ 399 ]
|
Proposal of new work item- Security Protection Guidelines of Value-added Service for Operators
|
China Mobile Communications Corporation
,
Electronics and Telecommunications Research Institute (ETRI)
,
ZTE Corporation
|
Q7/17
|
2015-08-24 |
|
[ 372 ]
(Rev.1) |
Draft Recommendation ITU-T X.authi: Guidelines and framework for sharing network authentication results with service applications
|
China Mobile Communications Corporation
|
Q10/17
|
2015-03-26 |
|
[ 320 ]
|
A proposal for text improvement of X.msec-7
|
China Mobile Communications Corporation
|
Q6/17
|
2015-03-19 |
|
[ 319 ]
|
Gap Analysis between IETF STIR [rfc7375] and X.ticvs to assist the finalization of X.ticvs
|
China Mobile Communications Corporation
|
Q5/17
|
2015-03-19 |
|
[ 318 ]
(Rev.1-4) |
First Draft of X.ticsc, Supplement to ITU-T X.1245, Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
|
China Mobile Communications Corporation
,
China Unicom
|
Q5/17
|
2015-03-19 |
|
[ 289 ]
|
Proposal for a new work item: Technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
|
China Mobile Communications Corporation
|
Q5/17
|
2014-09-03 |
|
[ 288 ]
|
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2014-09-03 |
|
[ 287 ]
(Rev.1) |
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2014-09-03 |
|
[ 285 ]
(Rev.1) |
The draft Recommendation for X.p2p-3:Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile Communications Corporation
|
Q7/17
|
2014-09-03 |
|
[ 284 ]
(Rev.1) |
Proposals to protect the PII data in X.gpim
|
China Mobile Communications Corporation
|
Q3/17
|
2014-09-03 |
|
[ 283 ]
|
Draft X.authi: Guideline to implement the integration of service authentication with network authentication
|
China Mobile Communications Corporation
|
Q10/17
|
2014-09-03 |
|
[ 183 ]
(Rev.1) |
Revised draft text of X.msec-7: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2013-12-31 |
|
[ 180 ]
(Rev.1) |
Revised draft text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-12-31 |
|
[ 179 ]
(Rev.1) |
X.authi: Guideline to implement the authentication integration of the network layer and the service layer
|
China Mobile Communications Corporation
,
China
,
ZTE Corporation
|
Q10/17
|
2013-12-31 |
|
[ 178 ]
(Rev.1) |
Proposed edits to X.gpim "Guideline for management of personally identifiable information for telecommunication organizations"
|
China Mobile Communications Corporation
|
Q3/17
|
2013-12-31 |
|
[ 156 ]
|
Comments on the new work item X.tfcmm
|
China Mobile Communications Corporation
|
Q5/17
|
2013-08-15 |
|
[ 155 ]
|
4th draft of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-08-15 |
|
[ 77 ]
(Rev.1) |
ITU-T X.1205 - Supplement on guidelines for abnormal traffic detection and control on IP-based networks
|
China Mobile Communications Corporation
|
Q4/17
|
2013-04-03 |
|
[ 76 ]
(Rev.1) |
Difference between the PII (personally identifiable information) in mobile telecom network and that in traditional systems
|
China Mobile Communications Corporation
|
Q3/17
|
2013-04-03 |
|
[ 74 ]
(Rev.1) |
Proposal for updating the text of sub-section into X.gpim
|
China Mobile Communications Corporation
|
Q3/17
|
2013-04-03 |
|
[ 72 ]
(Rev.1) |
Proposal text for section 8.4 "Digital right management mechanism in streaming service" in X.p2p-3
|
China Mobile Communications Corporation
|
Q7/17
|
2013-04-03 |
|
[ 70 ]
(Rev.1) |
Sample analysis of mobile malicious software
|
China Mobile Communications Corporation
|
Q6/17
|
2013-04-03 |
|
[ 68 ]
(Rev.1) |
Proposed text of Clause 10 and bibliography in X.authi
|
China Mobile Communications Corporation
|
Q10/17
|
2013-04-03 |
|
[ 66 ]
(Rev.1) |
IdM requirements for X.idmcc chap7
|
China Mobile Communications Corporation
|
Q10/17
|
2013-04-03 |
|
[ 64 ]
(Rev.1) |
IdM requirements for X.idmcc chap8
|
China Mobile Communications Corporation
|
Q10/17
|
2013-04-03 |
|
[ 63 ]
(Rev.1) |
Proposed edits to X.goscc
|
China Mobile Communications Corporation
|
Q8/17
|
2013-04-03 |
|
[ 61 ]
(Rev.1) |
Comments on the latest draft of X.goscc
|
China Mobile Communications Corporation
|
Q8/17
|
2013-04-03 |
|
[ 59 ]
(Rev.1) |
Proposal of new work item: Framework of on-demand cloud security
|
China Mobile Communications Corporation
|
Q8/17
|
2013-04-03 |
|
[ 57 ]
(Rev.1-2) |
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2013-04-03 |
Results:52 total items. Result page:
1 -
2
- Next
|
Multiple Document Download: Formats and Languages to be included (when available):