Contributions
[ Source: China Mobile ] |
|
Numéro
|
Titre
|
Source
|
AI/Question
|
Date
|
|
[ 691 ]
|
Proposed Edits to clause 9&10 in X.ccsec
|
China
,
China Mobile Communications Corporation
|
Q8/17
|
2012-08-15 |
|
[ 690 ]
|
X.abnot: Abnormal traffic detection and control guideline for telecommunication network
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
,
ZTE Corporation
|
Q4/17
|
2012-08-15 |
|
[ 689 ]
|
1st Draft: Guidelines on the management of infected terminals in mobile networks
|
China Mobile Communications Corporation
|
Q6/17
|
2012-08-15 |
|
[ 688 ]
|
Revised Text of X.ticvs: Technologies involved in countering voice spam in telecommunication organizations
|
China Mobile Communications Corporation
|
Q5/17
|
2012-08-15 |
|
[ 687 ]
|
Authentication integration solution for IMS scenario in X.authi - part 2.
|
China Mobile Communications Corporation
|
Q10/17
|
2012-08-15 |
|
[ 686 ]
|
Authentication integration solution for IMS scenario in X.authi - part 1.
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-08-15 |
|
[ 685 ]
|
Analysis of the mobile telecom network specific PII(personally identifiable information) security protection
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q3/17
|
2012-08-15 |
|
[ 589 ]
|
Security Protection of Customer Information in Telecom Operators
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q3/17
|
2012-02-07 |
|
[ 588 ]
|
Authentication result transfer based on encrypted cookie for WLAN scenario
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 587 ]
|
Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2012-02-07 |
|
[ 586 ]
|
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
|
China Mobile Communications Corporation
|
Q6/17
|
2012-02-07 |
|
[ 585 ]
|
Reply to TD 2453: "Reply LS on management of infected terminals in mobile networks"
|
China Mobile Communications Corporation
|
Q6/17
|
2012-02-07 |
|
[ 584 ]
|
A Draft of Technology Involved in Countering Voice Spam-X.ticvs
|
China Mobile Communications Corporation
|
Q5/17
|
2012-02-07 |
|
[ 583 ]
|
Authentication integration solution for WLAN scenario in X.authi.
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2012-02-07 |
|
[ 515 ]
|
Authentication integration based on authentication gateway in X.authi
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2011-08-10 |
|
[ 514 ]
|
Authentication integration based on network authentication result transfer in X.authi
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2011-08-10 |
|
[ 513 ]
|
Proposal for a new work item: Security Management Guideline for Customer Information in Telecommunications Organization
|
China Mobile Communications Corporation
|
Q3/17
|
2011-08-10 |
|
[ 512 ]
|
Proposal for a new work item: Technologies Involved in Countering Voice Spam in Telecommunication Organizations
|
China Mobile Communications Corporation
|
Q5/17, Q4/17
|
2011-08-10 |
|
[ 511 ]
|
Proposal for a new work item: Guidelines on the Infected Terminals Management in Mobile Networks
|
China Mobile Communications Corporation
|
Q4/17
|
2011-08-10 |
|
[ 510 ]
|
Proposal for a new work item: Malicious and Harmful Source Traceback on Spam for Child Online Protection
|
China Mobile Communications Corporation
|
Q5/17
|
2011-08-10 |
|
[ 509 ]
|
Performance and Interface of the abnormal traffic detection and control system
|
China Mobile Communications Corporation
,
Huawei Technologies Co. Ltd.
|
Q4/17
|
2011-08-10 |
|
[ 508 ]
|
Proposed draft Recommendation for X.authi: Authentication integration in IDM
|
China Mobile Communications Corporation
,
ZTE Corporation
|
Q10/17
|
2011-08-10 |
|
[ 507 ]
|
VoIP security mechanism of X.p2p-3
|
China
,
China Mobile Communications Corporation
,
ZTE Corporation
|
Q7/17
|
2011-08-10 |
|
[ 410 ]
(Rev.1) |
Propose a chapter on virtualization security for X.srfctse
|
ZTE Corporation, China Mobile
|
Q8/17
|
2011-03-29 |
|
[ 328 ]
|
Propose an authentication method involving Authentication Router for X.srfctse
|
ZTE Corporation, China Mobile
|
Q8/17
|
2010-11-25 |
|
[ 327 ]
|
Propose a federation gateway for X.srfctse
|
ZTE Corporation, China Mobile
|
Q8/17
|
2010-11-25 |
|
[ 326 ]
(Rev.1) |
Proposal for updating "Procedure of security policy distribution" section in X.gpn
|
ZTE, China Mobile
|
Q4/17
|
2010-11-25 |
|
[ 325 ]
|
Proposal for new work item on security requirements and framework of ubiquitous networking
|
ZTE, China Unicom, China Mobile
|
Q6/17
|
2010-11-25 |
|
[ 302 ]
|
Trust management evaluation criteria of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 301 ]
|
Trust management assumption of X.p2p-3
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 300 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile
|
Q7/17
|
2010-11-25 |
|
[ 266 ]
|
User authentication mechanism of X.p2p-3
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 264 ]
|
The draft Recommendation for X.p2p-3: Security requirements and mechanisms of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2010-03-26 |
|
[ 261 ]
|
Proposed draft Recommendation for X.authi: Authentication Integration in IDM
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 260 ]
|
Proposed draft Rec. X.ismf, Information security management framework
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 257 ]
|
Organization and Personnel part in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 254 ]
|
Comparing analysis of abnormal traffic system deployment solutions in X.abnot
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 252 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2010-03-26 |
|
[ 251 ]
|
Proposal for adding chapter 8.3 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
ZTE, China Mobile
|
Q4/17
|
2010-03-26 |
|
[ 243 ]
|
Assets Management in X.ismf
|
China Mobile
|
Q3/17
|
2010-03-26 |
|
[ 242 ]
|
An analysis of X.authi: Authentication integration between the network and service layers
|
China Mobile, China MII, ZTE
|
Q10/17
|
2010-03-26 |
|
[ 241 ]
|
A solution to solve the repeated clean problem in the abnormal traffic control system deployment
|
China Mobile, Huawei
|
Q4/17
|
2010-03-26 |
|
[ 180 ]
+Corr.1 |
Proposed text for section 6 of X.idmgen
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 179 ]
+Corr.1 |
Proposed text for authentication assurance interoperation in X.idm-ifa
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 178 ]
|
Proposal for modification to chapter 8 of draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 177 ]
|
Proposal for miscellaneous modification to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 176 ]
|
Proposal for adding chapter 10 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 175 ]
|
Proposal for adding chapter 9 to draft Recommendation for X.gpn: Mechanism and procedure for distributing policies for network security
|
China Mobile, ZTE
|
Q4/17
|
2009-09-07 |
|
[ 174 ]
+Corr.1 |
Proposed text for trust establishment in X.idm-ifa
|
China Mobile, ZTE Corporation
|
Q10/17
|
2009-09-07 |
|
[ 105 ]
|
Basic concept for authentication mechanism of P2P-based telecommunication network
|
China Mobile, China MII, ZTE
|
Q7/17
|
2009-09-03 |
Resultats:60 documents Résultats :
1 -
2
- Suivant
|
Téléchargement de multiples documents: Formats et langues à prendre en compte (si disponibles):