Contributions
[ Source: China Mobile Communications Co. Ltd. ] ![Documents / Contributions](/res/templates/dms/images/key.gif) |
|
Number
|
Title
|
Source
|
AI/Question
|
Date
|
|
[ 647 ]
|
Proposal for new work item on X.uasto: Functional requirements for the unified authentication service of telecommunication operators
|
China Mobile Communications Co. Ltd.
|
Q7/17
|
2024-02-07 |
|
[ 640 ]
|
Revised baseline text for X.secadef: Security Capabilities Definitions (suggestions on work methods)
|
China Mobile Communications Co. Ltd.
|
Q15/17
|
2024-02-07 |
|
[ 638 ]
|
1st Revised baseline text X.dlt-share: Security requirements for data application software based on DLT to achieve statistics
|
China Mobile Communications Co. Ltd.
|
Q14/17
|
2024-02-07 |
|
[ 637 ]
|
1st Revised baseline text for X.rm-sup: Risk management on the security of software supply-chain for telecommunication organizations
|
China Mobile Communications Co. Ltd.
|
Q3/17, Q15/17
|
2024-02-07 |
|
[ 636 ]
|
Revised baseline text for X.5Gsec-netec: Security Capabilities of Network Layer for IMT-2020/5G Edge Computing (for determination)
|
China Mobile Communications Co. Ltd.
|
Q2/17
|
2024-02-07 |
|
[ 610 ]
|
Proposal for new work item X.sa-iot: Technology requirements for security awareness of IoT devices
|
China Mobile Communications Co. Ltd.
|
Q6/17
|
2024-02-06 |
|
[ 609 ]
|
Proposal for new work item TR.sg-lmcs: Security guidelines of DLT-based lifecycle management for computing services
|
Beijing Jiaotong University (China)
,
China Mobile Communications Co. Ltd.
|
Q2/17
|
2024-02-06 |
|
[ 584 ]
|
Proposal for new work item TR.saai: Guidelines for Security Evaluation on Artificial Intelligence Technology
|
China Mobile Communications Co. Ltd.
|
Q15/17
|
2024-02-06 |
|
[ 582 ]
|
Proposal for new work item X.qsdlt-ca: Guidelines for quantum-safe DLT systems with crypto-agility
|
China Mobile Communications Co. Ltd.
|
Q14/17
|
2024-02-06 |
|
[ 580 ]
|
Proposal for new work item X.rf-dw: Requirements and application framework for digital watermarking
|
China Mobile Communications Co. Ltd.
|
Q7/17
|
2024-02-06 |
|
[ 578 ]
|
2nd Revised baseline text for X.sg-scmr: Security guidelines for selecting computing methods and resources from Cloud Service Providers
|
China Mobile Communications Co. Ltd.
|
Q8/17
|
2024-02-06 |
|
[ 577 ]
|
7th Revised baseline text for X.sg-dtn: Security Guidelines for Digital Twin Network(for consent)
|
China Mobile Communications Co. Ltd.
|
Q7/17
|
2024-02-06 |
|
[ 575 ]
|
5th Revised baseline text for TR.5Gsec-bsf: Guidelines of Built-in Security Framework for the Telecommunications Network
|
China Mobile Communications Co. Ltd.
|
Q2/17
|
2024-02-06 |
|
[ 573 ]
|
Proposal for new work item TR.sd-cnc: Security guidelines for data of coordination of networking and computing
|
China Mobile Communications Co. Ltd.
|
Q2/17
|
2024-02-06 |
|
[ 548 ]
|
Proposal for new work item X.gsm-dlt, Guidelines for security management of DLT service provider
|
China Mobile Communications Co. Ltd.
,
Ministry of Industry and Information Technology (MIIT) (China)
|
Q14/17
|
2024-02-06 |
|
[ 546 ]
|
Proposal for new work item X.str-irs: Security threats and requirements for information recommendation service
|
China Mobile Communications Co. Ltd.
,
Ministry of Industry and Information Technology (MIIT) (China)
,
Vivo Mobile Communication Co., Ltd. (China)
|
Q7/17
|
2024-02-06 |
|
[ 544 ]
|
Proposal for new work item X.gpmr: Guidelines and security measures for prevention and mitigation of ransomware
|
China Mobile Communications Co. Ltd.
,
China Unicom
,
Ministry of Industry and Information Technology (MIIT) (China)
|
Q7/17
|
2024-02-06 |
|
[ 488 ]
|
Revised baseline text for X.dpki: Decentralized Public-key infrastructure
|
China Mobile Communications Co. Ltd.
,
China Telecommunications Corporation
,
Huawei Technologies Co., Ltd. (China)
|
Q11/17
|
2024-02-01 |
Results:18 total items.
|
Multiple Document Download: Formats and Languages to be included (when available):