Contributions
[ AI/Question: Q5/17 ] |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 353 ]
|
Architecture of external interfaces for telecommunication network security system
|
Russian Federation Telecommunication Admin.
|
Q5/17
|
2008-09-02 |
|
[ 344 ]
|
Comments on Draft Recommendation X.gisn, Guidelines for Implementing System and Network Security
|
Canada
|
Q7/17, Q5/17
|
2008-03-29 |
|
[ 264 ]
|
Architecture of External Interrelations for Telecommunication Network Security System
|
Russian Federation Telecom. Administration
|
Q5/17
|
2008-03-25 |
|
[ 254 ]
|
Revised text for new Question on Digital Media Protection
|
Korea (Republic of)
|
Q17/17, Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17
|
2007-11-30 |
|
[ 249 ]
|
Proposed text for new Question on countering cyber attacks by technical means
|
Korea (Republic of)
|
Q17/17, Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17
|
2007-11-30 |
|
[ 246 ]
|
Final text on X.akm: Guideline on EAP-based Authentication and Key Management in a Data Communication Network
|
Korea (Republic of)
|
Q5/17
|
2007-11-30 |
|
[ 241 ]
|
Update to Guidelines for Implementing System & Network Security
|
Lucent Technologies USA
|
Q5/17
|
2007-11-30 |
|
[ 236 ]
|
Remote Access to the Network
|
India
|
Q9/17, Q7/17, Q5/17, Q4/17
|
2007-11-30 |
|
[ 226 ]
|
Identification and authentication of bearer traffic (contribution to the draft Recommendation Y.NGN Authentication)
|
Lucent Technologies (USA)
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
|
2007-09-12 |
|
[ 225 ]
|
Mechanism for authenticating flow of bearer traffic in NGN (contribution to the draft Recommendation Y.NGN Security Mechanisms)
|
Lucent Technologies (USA)
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17, Q4/13, Q15/13
|
2007-09-12 |
|
[ 219 ]
|
Proposed idea on the structure of Security Activities for the next study period
|
Japan
|
Q4/17, Q5/17, Q6/17, Q7/17, Q8/17, Q9/17, Q17/17
|
2007-09-10 |
|
[ 198 ]
|
Comments on draft Recommendation X.805+, COM 17 - C 86 - E
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 195 ]
|
Comments on draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 194 ]
|
Guidelines for Implementing System & Network Security
|
Lucent Technologies (USA)
|
Q5/17
|
2007-09-10 |
|
[ 167 ]
|
Proposal for revised draft Recommendation on X.akm: Framework for EAP-based Authentication and Key Management in a data communication network
|
Korea (Republic of)
|
Q5/17
|
2007-09-09 |
|
[ 166 ]
|
Revised draft of the ITU-T Recommendation X.spn
|
Korea (Republic of)
|
Q5/17
|
2007-09-09 |
|
[ 128 ]
|
Proposal for updated first draft Recommendation on X.akm: Framework for EAP-based Authentication and Key Management in an end-to-end data communication network
|
Korea (Republic of)
|
Q5/17
|
2007-04-10 |
|
[ 127 ]
|
Proposal for updated draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
|
Korea (Republic of)
|
Q5/17
|
2007-04-10 |
|
[ 115 ]
|
Proposed some modifications in X.akm
|
ZTE Corporation
|
Q5/17
|
2007-04-10 |
|
[ 101 ]
|
Proposal for discussion on X.pak (Password-authenticated key exchange (PAK) protocol)
|
China
|
Q5/17
|
2006-11-27 |
|
[ 91 ]
|
A comment on the draft of network security certification based on ITU-T X.805
|
Japan
|
Q7/17, Q5/17
|
2006-11-27 |
|
[ 86 ]
|
Third draft of the ITU-T Recommendation X.805+
|
Russian Federation
|
Q5/17
|
2006-11-24 |
|
[ 85 ]
|
A proposal that the work on the draft Recommendation on Network security certification based on ITU-T Recommendation X.805 be terminated
|
Canada
|
Q5/17
|
2006-11-24 |
|
[ 84 ]
|
A proposal that the draft Recommendation on network security certification based on ITU-T Recommendation X.805 not be consented
|
Canada
|
Q5/17
|
2006-11-24 |
|
[ 64 ]
|
Proposal for a figure of a PAK protocol description in X.pak
|
Korea(Republic of)
|
Q5/17
|
2006-11-24 |
|
[ 63 ]
|
Proposal for First Draft Recommendation on X.ngn-akm - Framework for EAP-based Authentication and Key Management of NGN
|
Korea (Republic of)
|
Q5/17
|
2006-11-24 |
|
[ 62 ]
|
Proposed revision of draft Recommendation X.spn: Framework for creation, storage, distribution, and enforcement of policies for network security
|
Korea (Republic of)
|
Q5/17
|
2006-11-24 |
|
[ 53 ]
|
Applying ITU-T X.805 to physical security
|
Lucent Technologies (USA)
|
Q5/17
|
2006-11-22 |
|
[ 51 ]
|
Proposal to include common shared policy decision server among two different networks in draft of X.spn - Framework for creation, storage, distribution, and enforcement of policies for network security
|
Reliance Communications Limited, India
|
Q5/17
|
2006-11-22 |
|
[ 41 ]
|
Feedback on password-authenticated key exchange (PAK) protocol (COM 17- D 136)
|
Nortel Networks, Canada
|
Q5/17
|
2006-08-17 |
|
[ 17 ]
|
Report of the Joint Rapporteur's meeting on Security (Tokyo, 15-17 November 2004)
|
Vice-Chairman SG 17 (Yu Watanabe)
|
Q9/17, Q8/17, Q7/17, Q6/17, Q5/17, Q4/17
|
2005-01-14 |
Resultats:31 documents
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):