Committed to connecting the world

WRC-23

SG17 - List of Editors (Study Period 2022-2024)

Export:   
ITEM and TITLE EDITOR
CRAMM Roadmap

SG17 Cyber Security Reference Architectures, Models and Methodologies Strategy and Roadmap


N. KISHOR Narang
Editor

Email: kishor[at]narnix.com
Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
Security Compendium

ICT Security Compendium


Sandor Mazgon
Editor

Email: sandor.mazgon[at]ties.itu.int
Security Manual

Security Manual


Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
Security standards roadmap

ICT Security standards roadmap


Yiwen Wang
Editor

Email: wangyiwen[at]caict.ac.cn
SG17 implementation of PP-22 Res

SG17 activities and achievements in support of the most recent Resolutions of the ITU PP


Juhee Ki
Editor

Email: eye[at]iitp.kr
SG17 implementation of WTDC-21 Res

SG17 activities and achievements in support of the most recent Resolutions of the WTDC


Juhee Ki
Editor

Email: eye[at]iitp.kr
SG17 implementation of WTSA-20 Res

SG17 activities and achievements in support of the most recent Resolutions of the WTSA


Juhee Ki
Editor

Email: eye[at]iitp.kr
TR.5Gsec-bsf

Technical Report: Guidelines of built-in security framework for telecommunications network


Xiaoting Huang
Editor

Email: huangxiaoting[at]chinamobile.com
Li Su
Editor

Email: suli[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
TR.ac-pqc

Technical Report: Guidance on use of advanced cryptography based on PQC


Koji Nakao
Editor

Email: ko-nakao[at]nict.go.jp
TR.cs-sc

Technical Report: Collection of Security Concerns for extracting the Security Requirements for Cyber Security Reference Architecture


N. KISHOR Narang
Editor

Email: kishor[at]narnix.com
Jitender Prakash
Editor

Email: jitendra.prakash[at]gov.in
Preetika Singh
Editor

Email: preetika.singh87[at]gov.in
Pushpendra Kumar Singh
Editor

Email: pksingh.its[at]gmail.com
TR.cs-uc

Technical Report: Use cases for extracting the security requirements for cyber security reference architecture


Daeun Hyeon
Editor

Email: hde0610[at]naver.com
Juhee Ki
Editor

Email: eye[at]iitp.kr
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
TR.divs

Technical Report: Rationale and initial vision of a decentralized identity verification system (DIVS) based on verifiable data


Kenneth Featherling
Editor

Email: kmfeatherling[at]fbi.gov
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
TR.dw-lasf

Technical report: A landscape analysis and security features for a digital wallet


Xiaoyuan Bai
Editor

Email: xiaoyuan.bxy[at]antgroup.com
Dong Bin Choi
Editor

Email: dbchoi85[at]gmail.com
Xiongwei Jia
Editor

Email: jiaxw9[at]chinaunicom.cn
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
TR.fcnsc

Technical Report: Framework for cloud native based security collaboration mechanism among cloud service providers


Zhengwei Chang
Editor

Email: changzw[at]126.com
Lin Chen
Editor

Email: chenlin6[at]caict.ac.cn
Xuan Zha
Editor

Email: zhaxuan[at]caict.ac.cn
Linghao Zhang
Editor

Email: 16100178[at]qq.com
TR.gscim-dlt

Technical Report: Guidelines for security consideration for incident management by DLT service provider


Yue Chen
Editor

Email: chenyue[at]cert.org.cn
Han Han
Editor

Email: hanh[at]cert.org.cn
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Junzhi Yan
Editor

Email: yanjunzhi[at]chinamobile.com
Yunwei Zhao
Editor

Email: zhaoyunweimail[at]163.com
TR.hyb_qsafe

Technical Report: Overview of key management of hybrid approaches for quantum-safe communications


Dong-Hi Sim
Editor

Email: donghee.shim[at]sk.com
TR.kdc_qkdn

Technical Report: Key distribution center based approaches in the service layer to manage keys supplied by QKDN


Shen He
Editor

Email: heshen[at]chinamobile.com
Fuwen Liu
Editor

Email: liufuwen[at]chinamobile.com
Zhangchao Ma
Editor

Email: mazhangchao[at]qtict.com
Ye Tian
Editor

Email: tianye[at]chinamobile.com
Yong Zhao
Editor

Email: yong.zhao[at]quantum-info.com
TR.QKDN-SP

Technical Report: Overview of security profile for Quantum Key Distribution Networks in hybrid mode


Venkata Rama Raju Chelle
Editor

Email: cvramaraju.v[at]gov.in
Soumya Das
Editor

Email: soumya06.das[at]gmail.com
Prabhakar Krishnan
Editor

Email: kprabhakar[at]am.amrita.edu
Ravindra Pratap Singh
Editor

Email: rpsingh[at]prl.res.in
TR.sd-cnc

Technical report: Security guidelines for data of coordination of networking and computing


Li Su
Editor

Email: suli[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Tingting Yang
Editor

Email: yangtingting[at]chinamobile.com
TR.se-ai

Technical Report: Security Evaluation on Artificial Intelligence Technology in ICT


Jia Chen
Editor

Email: chenjia[at]chinamobile.com
Quanchao Liu
Editor

Email: liuquanchao[at]chinamobile.com
Yong Sun
Editor

Email: sy359975[at]alibaba-inc.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
TR.sec-int-cpc

Technical report: Security considerations for interconnection of computing power centers


Yu Jiang
Editor

Email: jiangyu[at]chinatelecom.cn 
Xiang Liu
Editor

Email: liux15[at]pcl.ac.cn
Weizhe Zhang
Editor

Email: weizhe.zhang[at]pcl.ac.cn
Yu Zhang
Editor

Email: zhuangy08[at]pcl.ac.cn
TR.sg-lmcs

Technical report: Security guidelines for DLT-based lifecycle management of computing services


Lanfang Ren
Editor

Email: renlanfang[at]chinamobile.com
Junzhi Yan
Editor

Email: yanjunzhi[at]chinamobile.com
Bo Yang
Editor

Email: yangbo[at]chinamobile.com
Huachun Zhou
Editor

Email: hchzhou[at]bjtu.edu.cn
TR.SIMRegBio

Technical Report: Guidelines for SIM Identity and Biometrics Registration


Kwadwo Osafo-Maafo
Editor

Email: kwadwo.osafo-maafo[at]nca.org.gh
opeolu oyebanji
Editor

Email: opeolu[at]ncc.gov.ng
Shamsuddeen Sabo
Editor

Email: ssabo[at]ncc.gov.ng
Pushpendra Kumar Singh
Editor

Email: pksingh.its[at]gmail.com
TR.smpa

Technical Report: Security middle platform architecture


Jingyang Li
Editor

Email: lijy29[at]chinatelecom.cn
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Shuai Wang
Editor

Email: wangshuai8[at]chinatelecom.cn
Haodi Zhang
Editor

Email: zhanghaodi[at]chinatelecom.cn
TR.srsec

Technical Report: Security aspects of segment routing IPv6 for the convergence of computing and network for telecommunication operators


Gang Du
Editor

Email: dugang[at]cmdi.chinamobile.com
Xuetao Du
Editor

Email: duxuetao[at]cmdi.chinamobile.com
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
TR.st-iot

Technical Report: Security threat scenarios in Internet of Things


Ernesto Silveira
Editor

Email: ernestom[at]anatel.gov.br
Dalton Valadares
Editor

Email: dalton.valadares[at]virtus.ufcg.edu.br
TR.Sussrev

Technical Report: Successful use of security standards


Abbie Barbir
Editor

Email: BarbirA[at]cvshealth.com
TR.verm

Technical Report: Framework for verification of messages


Kwadwo Osafo-Maafo
Editor

Email: kwadwo.osafo-maafo[at]nca.org.gh
X.5Gsec-asra

Guidelines and Technical Requirements for 5G Network Asset Security Risk Analysis


Qin Qiu
Editor

Email: qiuqin[at]chinamobile.com
Daoli Su
Editor

Email: sudl[at]chinatelecom.cn
Tian Tian
Editor

Email: tian.tian1[at]zte.com.cn
Jing Wang
Editor

Email: wang.jing17[at]zte.com.cn
X.500 Amd.1

The Directory: Overview of concepts, models and services


Erik Andersen
Editor

Email: era[at]x500.eu
X.501 Amd.2

The Directory: Models


Erik Andersen
Editor

Email: era[at]x500.eu
X.508 (ex X.pki-em)

Public-key infrastructure: Establishment and maintenance


Erik Andersen
Editor

Email: era[at]x500.eu
X.509 Amd.1

The Directory: Public-key and attribute certificate frameworks


Erik Andersen
Editor

Email: era[at]x500.eu
Qin Li
Editor

Email: qin.li[at]iwncomm.com
X.510 Amd.1

The Directory - Protocol specifications for secure operations


Erik Andersen
Editor

Email: era[at]x500.eu
Qin Li
Editor

Email: qin.li[at]iwncomm.com
X.511 Amd.1

The Directory - Abstract service definition


Erik Andersen
Editor

Email: era[at]x500.eu
X.518 Amd.1

The Directory - Procedures for distributed operation


Erik Andersen
Editor

Email: era[at]x500.eu
X.519 Amd.1

The Directory - Protocol specifications


Erik Andersen
Editor

Email: era[at]x500.eu
X.520 Amd.1

The Directory - Selected attribute types


Erik Andersen
Editor

Email: era[at]x500.eu
X.521 Amd.1

The Directory - Selected object classes


Erik Andersen
Editor

Email: era[at]x500.eu
X.525 Amd.1

The Directory - Replication


Erik Andersen
Editor

Email: era[at]x500.eu
X.1053rev

Information security controls based on ITU-T X.1051 for small and medium-sized telecommunication organizations


Changoh Kim
Editor

Email: peterx.1053[at]gmail.com
Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.1058-rev

Information security, cybersecurity and privacy protection — Code of practice for personally identifiable information protection


Changoh Kim
Editor

Email: peterx.1053[at]gmail.com
Jinghua Min
Editor

Email: minjinghua[at]cecgw.cn
Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.1060rev

Framework for the creation and operation of a cyber defence/security centre


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
Shigenori TAKEI
Editor

Email: takei.shigenori[at]ntt-tx.co.jp
X.1221

Structured Threat Information Expression (STIE)


Michael Rosa
Editor

Email: mjrosa[at]cyber.nsa.gov
Duncan Sparrell
Editor

Email: duncan[at]sfractal.com
X.1222

Trusted Automated Exchange of Intelligence Information (TAEII)


Michael Rosa
Editor

Email: mjrosa[at]cyber.nsa.gov
Duncan Sparrell
Editor

Email: duncan[at]sfractal.com
X.1237

Security requirements for personally identifiable information protection while countering mobile messaging spam


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Wei Liu
Editor

Email: liuw147[at]chinaunicom.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Bo Yu
Editor

Email: yubo49[at]chinaunicom.cn
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Yanbin Zhang
Editor

Email: zhangyanbin[at]caict.ac.cn
X.1250rev

Baseline capabilities for enhanced identity management and interoperability


Abbie Barbir
Editor

Email: BarbirA[at]cvshealth.com
X.1254rev

Entity authentication assurance framework


Abbie Barbir
Editor

Email: BarbirA[at]cvshealth.com
Sylvan Tran
Editor

Email: trans[at]aetna.com
X.1283

Threat Analysis and guidelines for securing password and password-less authentication solutions


Abbie Barbir
Editor

Email: BarbirA[at]cvshealth.com
X.1353

Blockchain-based Security Methodology for Zero-Touch Deployment of Massive IoT


Xin Kang
Editor

Email: kang.xin[at]huawei.com
Haiguang Wang
Editor

Email: wang.haiguang1[at]huawei.com
Weidong Wang
Editor

Email: wangweidong[at]chinawllc.com
X.1354

Security controls for IoT systems


Lijun Liu
Editor

Email: liulijun[at]cmiot.chinamobile.com
Koji Nakao
Editor

Email: ko-nakao[at]nict.go.jp
X.1384

Security requirements and guidelines for vehicular edge computing


Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
X.1400rev

Terms and definitions for distributed ledger technology


Jae Nam Ko
Editor

Email: freeinlove1127[at]gmail.com
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.1471

Reference monitor for online analytics services


Hyung-jin Lim
Editor

Email: hjlim[at]fsec.or.kr
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Jongyoul Park
Editor

Email: jongyoul[at]seoultech.ac.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.1631rev

Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services


Mark Mcfadden
Editor

Email: mark[at]internetpolicyadvisors.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Koji Nakao
Editor

Email: ko-nakao[at]nict.go.jp
X.1818

Security controls for operation and maintenance of IMT-2020/5G network systems


Ayumu Kubota
Editor

Email: ay-kubota[at]kddi.com
Yutaka Miyake
Editor

Email: yu-miyake[at]kddi.com
Koji Nakao
Editor

Email: ko-nakao[at]nict.go.jp
X.1819

Security capabilities of network layer for IMT-2020/5G edge computing


Yifu Wang
Editor

Email: wangyifu[at]cmdi.chinamobile.com
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Bei Zhao
Editor

Email: zhaobei[at]cmdi.chinamobile.com
X.1820

Security Requirements for Operation of IMT-2020/5G Core Network to Support Vertical Services


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Ming He
Editor

Email: heming8[at]chinatelecom.cn
Guorong Liu
Editor

Email: liugr6[at]chinatelecom.cn
Jun Shen
Editor

Email: shenjun6[at]chinatelecom.cn
X.aamd-sec

Security guidelines for categorized data in advanced air mobility (AAM)


Changhun Jung
Editor

Email: changhun[at]hyundai.com
Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Yousik Lee
Editor

Email: yousik.lee[at]escrypt.com
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
X.accsadlt

Access security authentication based on DLT


Seung Ju Jeon
Editor

Email: jkme098[at]fnsvalue.co.kr
Ariff Olan Kholid
Editor

Email: ariffolan[at]fnsvalue.co.kr
Radhilufti Madehi
Editor

Email: radhi[at]fnsvalue.co.kr
Norkhadhra Nawawi
Editor

Email: norkhadhra[at]fnsvalue.co.kr
X.afotak

Authentication framework based on one-time authentication key using distributed ledger technology


Hun Joo Chang
Editor

Email: hannah[at]fnsvalue.co.kr
Seung Ju Jeon
Editor

Email: jkme098[at]fnsvalue.co.kr
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.af-sec

Evaluation methodologies for anonymization techniques using face images in autonomous vehicles


Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Yousik Lee
Editor

Email: yousik.lee[at]escrypt.com
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
X.arch-design

Design principles and best practices for security architectures


N. KISHOR Narang
Editor

Email: kishor[at]narnix.com
Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
X.asm-cc

Requirements of attack surface management for cloud computing


Maofei Chen
Editor

Email: chenmf6[at]chinatelecom.cn
Fangfang Dai
Editor

Email: daifangfang[at]caict.ac.cn
Dongxin Liu
Editor

Email: liudongxin[at]chinatelecom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglaifu[at]chinatelecom.cn
X.bvm

Requirements for biometric variability management


Jason Kim
Editor

Email: kimjs[at]kisa.or.kr
Eunjeong Park
Editor

Email: eunjeong.ej[at]gmail.com
X.cdc-csirt

Relationship between Cyber Defence/Security Center and Computer Security Incident Response Team


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
X.ckrp

Framework of cryptographic key resource pool for cloud computing


Ming He
Editor

Email: heming8[at]chinatelecom.cn
Jun Shen
Editor

Email: shenjun6[at]chinatelecom.cn
Leyi Zhang
Editor

Email: leyi.zhang[at]zte.com.cn
X.cs-ra

Cyber security reference architecture


N. KISHOR Narang
Editor

Email: kishor[at]narnix.com
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Preetika Singh
Editor

Email: preetika.singh87[at]gov.in
Pushpendra Kumar Singh
Editor

Email: pksingh.its[at]gmail.com
X.dlt-ccs-fr

Security requirements and framework of cross-chain service for DLT systems


Zheng Huang
Editor

Email: huang.zheng2[at]zte.com.cn
Xiongwei Jia
Editor

Email: jiaxw9[at]chinaunicom.cn
Ziqin Sang
Editor

Email: zqsang[at]wri.com.cn
X.dlt-dgi

Security requirements of DLT gateway for interoperability


Jung Yeon HWANG
Editor

Email: jyhwang[at]sungshin.ac.kr
Xiongwei Jia
Editor

Email: jiaxw9[at]chinaunicom.cn
KIM Youngjin
Editor

Email: yjkim[at]dreamsecurity.com
X.dlt-share

Security requirements for data application software based on DLT to achieve statistics


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Qiuli Mei
Editor

Email: meiqiuli2010[at]163.com
Gaoshan ZHANG
Editor

Email: zhanggaoshan[at]cmdi.chinamobile.com
X.dpki

Decentralized Public-key infrastructure


Erik Andersen
Editor

Email: era[at]x500.eu
X.dtns

Guidelines of using digital twin of network for network security


HaiTao Du
Editor

Email: duhaitao[at]chinamobile.com
Li Su
Editor

Email: suli[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.evpnc-sec

Security guidelines for electric vehicle plug and charge (PnC) services using vehicle identity (VID)


Byoung-Moon Chin
Editor

Email: bmchin[at]tta.or.kr
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Kiho Yeo
Editor

Email: beware523[at]paran.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.evtol-sec

Security guidelines and requirements for an electric vertical take-off and landing (eVTOL) vehicle in an urban air mobility (UAM) environment


Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
Aram Cho
Editor

Email: aram[at]hyundai.com
Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
X.fod-sec

Security guidelines for a feature on demand (FoD) service in a connected vehicle environment


Jiyong Han
Editor

Email: jiyong.han[at]hyundai.com
Changhun Jung
Editor

Email: changhun[at]hyundai.com
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
X.fr-msp

Functional Requirements of Microsegmentation Platform in a cloud-based environment


Huamin Jin
Editor

Email: jinhm.gd[at]chinatelecom.cn
Shuai Wang
Editor

Email: wangshuai8[at]chinatelecom.cn
Haodi Zhang
Editor

Email: zhanghaodi[at]chinatelecom.cn
X.fr-vsasi

Functional requirements for visualization service of network security assets and security incidents based on digital twin


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Mengxiang Han
Editor

Email: hanmx12[at]chinaunicom.cn
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.gapci

Guidelines on Anti-DDoS protection for cloud infrastructure


Lin Chen
Editor

Email: chenlin6[at]caict.ac.cn
Hang Dong
Editor

Email: donghang[at]chinamobile.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Yue Shi
Editor

Email: shiyue1[at]caict.ac.cn
X.gcspcc

Guidelines of developing of cybersecurity simulation platform based on cloud computing


Lu Chen
Editor

Email: chenl225[at]chinaunicom.cn
Wei Liu
Editor

Email: liuw147[at]chinaunicom.cn
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Shuai Wang
Editor

Email: wangshuai8[at]chinatelecom.cn
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
X.gdsml

Guidelines for data security using machine learning in big data infrastructure


Mi Cao
Editor

Email: caom11[at]chinaunicom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglaifu[at]chinatelecom.cn
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
X.gecds

Guideline on edge computing data security


Lu Chen
Editor

Email: Chenl225[at]chinaunicom.cn
Zhaoji Lin
Editor

Email: lin.zhaoji[at]foxmail.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Shuai Wang
Editor

Email: wangs[at]gsta.com
X.gnssa-iot

Guidelines of implementing network security situational awareness for IoT systems


Maofei Chen
Editor

Email: chenmf6[at]chinatelecom.cn
Zhaoji Lin
Editor

Email: lin.zhaoji[at]foxmail.com
Dongxin Liu
Editor

Email: liudongxin[at]chinatelecom.cn
Laifu Wang
Editor

Email: wanglaifu[at]chinatelecom.cn
X.gpmr

Guidelines and security measures for prevention and mitigation of ransomware


Mufan Cui
Editor

Email: cuimf[at]cert.org.cn
Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Zhihui Han
Editor

Email: hzh[at]cert.org.cn
Minfeng Qiu
Editor

Email: qiuminfeng[at]chinamobile.com
Wenlei Wang
Editor

Email: wwl[at]cert.org.cn
X.gsm-cdc

Guidelines on Security Metrics for CDC


Hiroshi Takechi
Editor

Email: hiro[at]takechi.org
X.ias

Functional requirements for the integrated authentication service of telecommunication operators


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
Yunfa Zhu
Editor

Email: 19802024070[at]139.com
X.icd-schemas

Vendor agnostic security data schemas for integrated cyber defence solutions


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
X.idse

Evaluation methodology for in-vehicle intrusion detection systems


Weiwei Gong
Editor

Email: gongweiwei[at]360.cn
Huamin Jin
Editor

Email: jhm[at]gsta.com;
Laifu Wang
Editor

Email: wanglaifu[at]chinatelecom.cn
Minrui Yan
Editor

Email: yanminrui1[at]huawei.com
Yi Zhang
Editor

Email: zhangyi1-s[at]360.cn
X.ig-dw

Implementation guidelines for digital watermarking


Shiqi Li
Editor

Email: lishiqi.li[at]alibaba-inc.com
Weiwei Sun
Editor

Email: sunweiwei.sww[at]alibaba-inc.com
Yong Sun
Editor

Email: sy359975[at]alibaba-inc.com
X.mbaas-cs-sec

Security requirements and framework of collaboration service for multiple blockchain as a service platforms


Xiongwei Jia
Editor

Email: jiaxw9[at]chinaunicom.cn
Keng Li
Editor

Email: kli[at]fiberhome.com
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
Yuwei Wang
Editor

Email: ywwang[at]ict.ac.cn
X.mt-feature

Security features to assess mobile terminal security


Samir Abdelgawad
Editor

Email: sgaber[at]tra.gov.eg
Zhiyuan Hu
Editor

Email: huzhiyuan[at]vivo.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.mt-integrity

Security guidelines for mobile terminal integrity protection


Samir Abdelgawad
Editor

Email: sgaber[at]tra.gov.eg
Zhiyuan Hu
Editor

Email: huzhiyuan[at]vivo.com
Weidong Wang
Editor

Email: wangweidong[at]chinawllc.com
X.nspam

Security framework for network storage protection against malware attacks


Bongchan Kim
Editor

Email: kbchani[at]namusoft.co.kr
Jonghyun Kim
Editor

Email: jhk[at]etri.re.kr
Sujung Park
Editor

Email: sjpark[at]tta.or.kr
Sungyong Shin
Editor

Email: syshin[at]filingbox.com
Jonghyun Woo
Editor

Email: jhwoo[at]dualauth.com
X.oob-pacs

Framework for out-of-band physical access control systems using beacon-initiated mutual authentication


Il Jin Jung
Editor

Email: jiljin[at]estorm.co.kr
Tail Lee
Editor

Email: tail3831[at]estorm.co.kr
Youngjoo Lee
Editor

Email: yjyjoo99[at]naver.com
Sujung Park
Editor

Email: sjpark[at]tta.or.kr
Heejun Shin
Editor

Email: heejun[at]estorm.co.kr
Jonghyun Woo
Editor

Email: jhwoo[at]dualauth.com
X.ota-sec

Implementation and evaluation of security functions to support over-the-air (OTA) update capability in connected vehicles


Sang-Woo Lee
Editor

Email: ttomlee[at]etri.re.kr
Yousik Lee
Editor

Email: yousik.lee[at]escrypt.com
Seungwook Park
Editor

Email: seungwook.park[at]hyundai.com
Samuel Woo
Editor

Email: samuelwoo[at]dankook.ac.kr
X.pg-cla

Procedural guideline for continual learning to actively respond to network attacks


Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Jongyoul Park
Editor

Email: jongyoul[at]seoultech.ac.kr
X.qsdlt-ca

Guidelines for building crypto-agility and migration for quantum-safe DLT systems


Fuwen Liu
Editor

Email: liufuwen[at]chinamobile.com
Li Su
Editor

Email: suli[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
Weidong Wang
Editor

Email: wangweidong[at]chinawllc.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.ra-iot

Security risk analysis framework for IoT devices


Gunhee Lee
Editor

Email: icezzoco[at]gmail.com
Shinya Sasa
Editor

Email: shinya.sasa.ue[at]hitachi.com
X.rm-sup

Risk management on the security of software supply-chain for telecommunication organizations


Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Qin Qiu
Editor

Email: qiuqin[at]chinamobile.com
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.sa-ec

Security architecture of edge cloud


Huamin Jin
Editor

Email: jhm[at]gsta.com;
Zhaoji Lin
Editor

Email: lin.zhaoji[at]foxmail.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Shuai Wang
Editor

Email: wangs[at]gsta.com
Haodi Zhang
Editor

Email: zhanghaodi[at]chinatelecom.cn
X.sc-dlt

Security controls for distributed ledger technology


Kadio Kassy
Editor

Email: kadio.kassy[at]artci.ci
Youngjoo Lee
Editor

Email: yjyjoo99[at]naver.com
Kyeong Hee Oh
Editor

Email: khoh[at]tcaservices.kr
Keundug Park
Editor

Email: jacepark926[at]gmail.com
Preetika Singh
Editor

Email: preetika.singh87[at]gov.in
Sandeep Kumar Vijaivergia
Editor

Email: dirngn.tec[at]gov.in
X.scr-cna

Security requirements of sandboxed container runtime for cloud native applications


Shiqi Li
Editor

Email: lishiqi.li[at]alibaba-inc.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Linze Wu
Editor

Email: wulinz[at]chinatelecom.cn
Zeya Zhu
Editor

Email: zhuzy13[at]chinatelecom.cn
X.sc-sscti

Guidelines on Security Capabilities for Software Supply Chain in the Telecommunications Industry


Yuanying Xiao
Editor

Email: xiaoyy1[at]chinatelecom.cn
Jia Xie
Editor

Email: xiej68[at]chinatelecom.cn
Baoqi Yan
Editor

Email: yanbq[at]chinatelecom.cn
X.sec_QKD_profr

Framework of quantum key distribution (QKD) protocols in QKD network


Kaoru Kenyoshi
Editor

Email: kaoru.kenyoshi[at]nict.go.jp
Hao Qin
Editor

Email: hao.qin[at]nus.edu.sg
X.sec_QKDN_AA

Authentication and authorization in QKDN


Kaoru Kenyoshi
Editor

Email: kaoru.kenyoshi[at]nict.go.jp
Kazunori Tanikawa
Editor

Email: kaz.tanikawa[at]nict.go.jp
X.sec_QKDN_CM

Security requirements and measures for quantum key distribution networks - control and management


Taesang Choi
Editor

Email: choits[at]etri.re.kr
Kaoru Kenyoshi
Editor

Email: kaoru.kenyoshi[at]nict.go.jp
Hyung-Soo (Hans) Kim
Editor

Email: hans.kim[at]iotct.net
Matthieu Legré
Editor

Email: matthieu.legre[at]idquantique.com
Kazunori Tanikawa
Editor

Email: kaz.tanikawa[at]nict.go.jp
Chun-Seok Yoon
Editor

Email: chuck.yoon[at]kt.com
X.sec_QKDNi

Security requirements for Quantum Key Distribution Network interworking (QKDNi)


Dong-Hi Sim
Editor

Email: donghee.shim[at]sk.com
Yazi Wang
Editor

Email: yazi_wang[at]bupt.edu.cn
Xiaosong Yu
Editor

Email: xiaosongyu[at]bupt.edu.cn
Yongli Zhao
Editor

Email: yonglizhao[at]bupt.edu.cn
X.SecaaS

Security threats to be identified in the domain of security as a service


Ming He
Editor

Email: heming8[at]chinatelecom.cn
Jun Shen
Editor

Email: shenjun6[at]chinatelecom.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.secadef

Security capabilities definitions


Arnaud Taddei
Editor

Email: arnaud.taddei[at]broadcom.com
Chen Zhang
Editor

Email: zhangchen[at]cmdi.chinamobile.com
X.sec-grp-mov

Security guideline for group movement service platform


Changoh Kim
Editor

Email: peterx.1053[at]gmail.com
HuyKang Kim
Editor

Email: cenda[at]korea.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.sf-dtea

Security framework for detecting targeted email attacks


Chunghan Kim
Editor

Email: KevinKim[at]kiwontech.com
Jonghyun Kim
Editor

Email: jhk[at]etri.re.kr
Sujung Park
Editor

Email: sjpark[at]tta.or.kr
Warren Sealey
Editor

Email: warren.sealey[at]broadcom.com
Hyunmin Shin
Editor

Email: hyunminshin[at]kiwontech.com
X.sfrms

Security framework and requirements of microservice for cloud computing using container technology


Jie Liu
Editor

Email: liujiewl[at]chinamobile.com
Wenjing Ma
Editor

Email: mawenjing[at]china-aii.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.sgcnp

Security guidelines for cloud native PaaS


Wei Liu
Editor

Email: liuw147[at]chinaunicom.cn
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglaifu[at]chinatelecom.cn
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
X.sgc-rcs

Guidelines for countering spam over rich communication service (RCS) messaging


Huamin Jin
Editor

Email: jhm[at]gsta.com;
Shuai Wang
Editor

Email: wangs[at]gsta.com
Haodi Zhang
Editor

Email: zhanghaodi[at]chinatelecom.cn
Yanbin Zhang
Editor

Email: zhangyanbin[at]caict.ac.cn
X.sg-dcs

Security guidelines for DLT-based digital collection services


Jihye Kim
Editor

Email: ngswma32[at]naver.com
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
X.sgdfs-us

Security guidelines for DFS applications based on USSD and STK


Vincent Mwesigwa
Editor

Email: vmwesigwa[at]ucc.co.ug
X.sgGenAI

Security Guidelines for Generative Artificial Intelligence Application Service


Yang Chen
Editor

Email: cheny1672[at]chinaunicom.cn
huifang li
Editor

Email: lihf209[at]chinaunicom.cn
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.sgmc

Security guidelines for multi-cloud


Wei Liu
Editor

Email: liuw147[at]chinaunicom.cn
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Lei Xu
Editor

Email: xulei56[at]chinaunicom.cn
Yi Zhang
Editor

Email: zhangyi1-s[at]360.cn
X.sgrtem

Security guidelines for real-time event monitoring and integrated management in smart city platforms


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Chang Song
Editor

Email: songc53[at]chinaunicom.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.sgsc

Security guidelines for serverless computing


Xiaoyuan Bai
Editor

Email: xiaoyuan.bxy[at]antgroup.com
Yong Feng
Editor

Email: lujing.fy[at]alibaba-inc.com
Shiqi Li
Editor

Email: lishiqi.li[at]alibaba-inc.com
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.sg-scmr

Security guidelines for selecting computing methods and resources from Cloud Service Providers


Huizheng Geng
Editor

Email: genghuizheng[at]chinamobile.com
Li Lu
Editor

Email: luli[at]chinamobile.com
Nan Meng
Editor

Email: mengnan[at]caict.ac.cn
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
X.sg-tc

Security guidelines of trusted cloud services


Lu Chen
Editor

Email: chenl225[at]chinaunicom.cn
Dongxin Liu
Editor

Email: liudongxin[at]chinatelecom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
X.shcd

Framework for Security Human Capability Development


Lee Hwee Hsiung
Editor

Email: hh.lee[at]cybersecurity.my
Khairul Kamarudin
Editor

Email: khairul.ekhwan[at]mtsfb.org.my
Thaib Mustafa
Editor

Email: thaibmus[at]tab.com.my
Norkhadhra Nawawi
Editor

Email: norkhadhra[at]fnsvalue.co.kr
X.smdtf

Security measures for digital twin federation in smart cities and communities


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Wenlei Wang
Editor

Email: wwl[at]cert.org.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Longjun Zhao
Editor

Email: szcskjyxgs[at]126.com
X.smdtsc

Security measure for digital twin system of smart cities


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Feng Zhang
Editor

Email: zhangfeng[at]chinamobile.com
Longjun Zhao
Editor

Email: szcskjyxgs[at]126.com
X.sm-iot

Technical requirements of security situation monitoring for Internet of things (IoT) devices


Hang Dong
Editor

Email: donghang[at]chinamobile.com
Xiaoqin Huang
Editor

Email: huangxiaoqin[at]cmiot.chinamobile.com
Lijun Liu
Editor

Email: liulijun[at]cmiot.chinamobile.com
Le Yu
Editor

Email: yule[at]chinamobile.com
shuang zhang
Editor

Email: zhangshuang[at]cmiot.chinamobile.com
X.soar-cc

Framework of security orchestration, automation and response for cloud computing


Maofei Chen
Editor

Email: chenmf6[at]chinatelecom.cn
Dongxin Liu
Editor

Email: liudongxin[at]chinatelecom.cn
Ye TAO
Editor

Email: taoy10[at]chinaunicom.cn
Laifu Wang
Editor

Email: wanglaifu[at]chinatelecom.cn
Yi Zhang
Editor

Email: zhangyi1-s[at]360.cn
X.so-sap

Guidelines for security orchestration of service access process


Jia Chen
Editor

Email: chenjia[at]chinamobile.com
Ke Wang
Editor

Email: wangkeyj[at]chinamobile.com
HaiYan Zhao
Editor

Email: zhaohaiyan[at]chinamobile.com
X.sr-ai

Security requirements for AI systems


Daeun Hyeon
Editor

Email: hde0610[at]naver.com
Jae Nam Ko
Editor

Email: freeinlove1127[at]gmail.com
Qing Liu
Editor

Email: liuqing6[at]chinatelecom.cn
Junhyung Park
Editor

Email: mintdeath[at]sch.ac.kr
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.srapi-cc

Security requirements of application programming interface (API) for cloud computing


Maofei Chen
Editor

Email: chenmf6[at]chinatelecom.cn
Dongxin Liu
Editor

Email: liudongxin[at]chinatelecom.cn
Leqing Wang
Editor

X.sr-da-gai

Security threats and requirements for data annotation service of generative artificial intelligence


Zhiyuan Hu
Editor

Email: huzhiyuan[at]vivo.com
Luhua Wang
Editor

Email: wlh[at]cert.org.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
Hong Zhang
Editor

Email: zhanghong[at]cert.org.cn
Yunwei Zhao
Editor

Email: zhaoyunweimail[at]163.com
X.srdidm

Security requirements for decentralized identity management systems using distributed ledger technology


Byoung-Moon Chin
Editor

Email: bmchin[at]tta.or.kr
Keundug Park
Editor

Email: jacepark926[at]gmail.com
Kiho Yeo
Editor

Email: beware523[at]paran.com
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.sr-dpts

Security requirements for DLT data on permissioned DLT-based distributed power trading systems


Lee Haneul
Editor

Email: hameul6789[at]gmail.com
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
Taeyang Lee
Editor

Email: taeyang[at]pel.sejong.ac.kr
X.srgsc

Security requirements and guidelines of application and service for smart city platform


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Jun Shen
Editor

Email: shenjun6[at]chinatelecom.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.srgsdcs

Security requirements and guidelines of sensing and data collection system for city infrastructure


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Mengxiang Han
Editor

Email: hanmx12[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.sr-iiot

Security requirements for the industrial Internet of things based smart manufacturing reference model


Lee Haneul
Editor

Email: hameul6789[at]gmail.com
Jong-Hyouk LEE
Editor

Email: jonghyouk[at]sejong.ac.kr
Jinsue Lee
Editor

Email: jinsue[at]pel.sejong.ac.kr
Taeyang Lee
Editor

Email: taeyang[at]pel.sejong.ac.kr
X.srm-fml

Security requirements and measures of federated machine learning


Jianing Chen
Editor

Email: chenjn[at]chinatelecom.cn
Xiongwei Jia
Editor

Email: jiaxw9[at]chinaunicom.cn
Qiuli Mei
Editor

Email: meiqiuli2010[at]163.com
X.srmpc

Security requirements for monitoring physical city assets


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Chang Song
Editor

Email: songc53[at]chinaunicom.cn
Junjie Xia
Editor

Email: xiajj2[at]chinaunicom.cn
X.ssc-sa

Guidelines for software supply chain security audit


Lizhu Su
Editor

Email: sulz9[at]chinaunicom.cn
X.str-irs

Security threats and requirements for information recommendation service


Zhiyuan Hu
Editor

Email: huzhiyuan[at]vivo.com
Junzhi Yan
Editor

Email: yanjunzhi[at]chinamobile.com
Yunwei Zhao
Editor

Email: zhaoyunweimail[at]163.com
X.st-ssc

Security threats of software supply chain


Da Eun Hyun
Editor

Email: chlrhekdms0610[at]sch.ac.kr
Jae Nam Ko
Editor

Email: freeinlove1127[at]gmail.com
Junhyung Park
Editor

Email: mintdeath[at]sch.ac.kr
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.sup-cdc

Supplement to X.1060: X.1060 Tutorial material


Hiroshi Takechi
Editor

Email: hiro[at]takechi.org
Shigenori TAKEI
Editor

Email: takei.shigenori[at]ntt-tx.co.jp
X.sup-cv2x-sec

Supplement to X.1813 - Security deployment scenarios for cellular vehicle -to-everything (C-V2X) services supporting ultra-reliable and low latency communication (URLLC)


Jeongwook Go
Editor

Email: jeongwookgo[at]gmail.com
Youngjae Kim
Editor

Email: yjkim[at]tta.or.kr
Jae Eon Oh
Editor

Email: jeoh[at]magdata.net
Seongki Shin
Editor

Email: skshin[at]magdata.net
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.sup-ekyc-dfs

Supplement to ITU-T X.1254: e-KYC use cases in digital financial services


Daeun Hyeon
Editor

Email: hde0610[at]naver.com
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.suppl.tig-iotsec

Technical implementation guidelines for IoT devices and gateway


Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Jyoti Sengar
Editor

Email: jyoti.sengar[at]gov.in
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.sup-sat-dfs

Supplement to ITU-T X.1254: Implementation of secure authentication technologies for digital financial services


Junhyung Park
Editor

Email: mintdeath[at]sch.ac.kr
Sungchae Park
Editor

Email: zoesc.park[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
X.tas

Telebiometric authentication using speaker recognition


Myung Geun Chun
Editor

Email: mgchun[at]chungbuk.ac.kr
Fatoumata SAMAKE
Editor

Email: f.samake[at]sotelma.ml
X.tc-ifd

Technical capabilities of interactive fraud detection


Bibo Liu
Editor

Email: lubibo.lbb[at]alibaba-inc.com
Jae Hoon Nah
Editor

Email: jhnah[at]etri.re.kr
Jin Peng
Editor

Email: jim.pj[at]antgroup.com
X.tg-fdma

Technical guidelines for fraud detection of malicious applications in mobile devices


Xiaoyuan Bai
Editor

Email: xiaoyuan.bxy[at]antgroup.com
Zhiyuan Hu
Editor

Email: huzhiyuan[at]vivo.com
Hazirah Md Nawi
Editor

Email: hazirah[at]mcmc.gov.my
Jin Peng
Editor

Email: jim.pj[at]antgroup.com
Weidong Wang
Editor

Email: wangweidong[at]chinawllc.com
Wenbiao Zhao
Editor

Email: wenbiao.zwb[at]antgroup.com
X.tis

Telebiometric authentication based on information splitting


Myung Geun Chun
Editor

Email: mgchun[at]chungbuk.ac.kr
X.vide

Guideline of visual feature protection and secure sharing mechanisms for de-identification


Feng Gao
Editor

Email: gaofeng149[at]chinaunicom.cn
Youngjoo Jo
Editor

Email: run.youngjoo[at]etri.re.kr
Jongyoul Park
Editor

Email: jongyoul[at]seoultech.ac.kr
X.ztmc

Guidelines for Hhigh level Zero trust model and its security capabilities for in telecommunication networks


Junhyung Park
Editor

Email: mintdeath[at]sch.ac.kr
Heung Youl Youm
Editor

Email: hyyoum[at]sch.ac.kr
Export: