Quick access
 
Contributions for Meeting CYBER#11
  (View query details here)    Show filter options
  
Refresh Export to...
Default View
To apply filters, please click on Refresh
Drag a column header and drop it here to group by that column
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 90 of 90
 UidTitleStatusSourceType
  
select
select
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 90 of 90
 CYBER(17)011057LS to ITU-T SG17 regarding QSCAcceptedApproach InfinityLSout
 CYBER(17)011056r3Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of ThingsAcceptedCNITLSout
 CYBER(17)011056r2Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of ThingsRevisedCNITLSout
 CYBER(17)011056r1Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of ThingsRevisedCNITLSout
 CYBER(17)011056Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of ThingsRevisedCNITLSout
 CYBER(17)011055r2Draft - DTR/CYBER-0021 v0.0.7 (TR 103 456 ) "NIS Directive Implementation"AcceptedCISDraft
 CYBER(17)011055r1Draft - DTR/CYBER-0021 v0.0.7 (TR 103 456 ) "NIS Directive Implementation"RevisedCISDraft
 CYBER(17)011055Draft - DTR/CYBER-0021 v0.0.7 (TR 103 456 ) "NIS Directive Implementation"RevisedCISDraft
 CYBER(17)011054r1LS to NFV on common interface to transfer sensitive functions to a trusted domainAcceptedBull SASLSout
 CYBER(17)011054LS to NFV on common interface to transfer sensitive functions to a trusted domainRevisedBull SASLSout
 CYBER(17)011053r1LS to ISO/IEC JTC 1/SC 27 on TC CYBER workAcceptedETSILSout
 CYBER(17)011053LS to ISO/IEC JTC 1/SC 27 on TC CYBER workRevisedETSILSout
 CYBER(17)011052r1LS to SA3AcceptedApproach InfinityLSout
 CYBER(17)011052LS to SA3RevisedApproach InfinityLSout
 CYBER(17)011051dts025-umlAvailableCNITOther
 CYBER(17)011050r1Suggested changes to draft for approval of WI 21 TR 103 456 Implementing NIS DirectiveAvailableMicrosoft LtdOther
 CYBER(17)011050Suggested changes to draft for approval of WI 21 TR 103 456 Implementing NIS DirectiveRevisedMicrosoft LtdOther
 CYBER(17)011049Introduce the NWI proposal on software securityAvailableGemalto N.V.Other
 CYBER(17)011048Introduce the NWI proposal on software securityReservedGemalto N.V.Other
 CYBER(17)011047Practical introductory guide to PrivacyNotedKATDraft
 CYBER(17)011046r1Summary of progress on WI 27 (MSP)AvailableADVENICA ABOther
 CYBER(17)011046Summary of progress on WI 27 (MSP)RevisedADVENICA ABOther
 CYBER(17)011045LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of ThingsAvailableITU-TLSin
 CYBER(17)011044status category C liaison with ISO/IEC JTC 1/SC 38/WG 5 AvailableISO/IEC JTC 1/SC 28LSin
 CYBER(17)011043Final TS 102 165-1 for approval combining all changes - changes accepted and cleanedAcceptedCadzow CommunicationsCR
 CYBER(17)011042Final TS 102 165-1 for approval combining all changes - changes highlightedAcceptedCadzow CommunicationsCR
 CYBER(17)011041a2COM(2017)477 Annex to Regulation for Cybersecurity ActAvailableCadzow CommunicationsOther
 CYBER(17)011041a1COM(2017)477 Regulation for Cybersecurity ActAvailableCadzow CommunicationsOther
 CYBER(17)011041Security Certification initiative in EUAvailableCadzow CommunicationsOther
 CYBER(17)011040NIS Questionnaire draft from ENISAAvailableCadzow CommunicationsOther
 CYBER(17)011039Report from QSC 3AvailableApproach InfinityReport
 CYBER(17)011038Draft - DTS/CYBER-0025 v0.0.4 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control"NotedCNITDraft
 CYBER(17)011037Some ideas and issues regarding Contexts in part-2AvailableADVENICA ABOther
 CYBER(17)011036Suggestions for Enhancements and Extensions of mcTLSAvailableADVENICA ABOther
 CYBER(17)011035r1STF529 Mil. C progress reportAcceptedCNITOther
 CYBER(17)011035STF529 Mil. C progress reportRevisedCNITOther
 CYBER(17)011034r1Draft - DTS/CYBER-0020 v0.0.8 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services"NotedCNITDraft
 CYBER(17)011034Draft - DTS/CYBER-0020 v0.0.8 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services"RevisedCNITDraft
 CYBER(17)011033r1Information Note on the history of TLSAvailableCISOther
 CYBER(17)011033Information Note on the history of TLSRevisedCISOther
 CYBER(17)011032Draft - DTS/CYBER-0019 v0.0.4 (TS 103 457 ) "Common interface to transfer sensitive functions to a trusted domain."NotedBull SASDraft
 CYBER(17)011031Draft - DTS/CYBER-0027-2 v0.0.3 (TS 103 523-2 ) "Middlebox - Part 2"NotedADVENICA ABDraft
 CYBER(17)011030Draft - DTS/CYBER-0027-1 v0.0.7 (TS 103 523-1 ) "Middlebox - Part 1"NotedADVENICA ABDraft
 CYBER(17)011029LS from ITU-T SG17 work on quantum-safe PKI AvailableITU-TLSin
 CYBER(17)011028LS from ITU-T SG17 on Technical framework for security services provided by operatorsAvailableITU-TLSin
 CYBER(17)011027a1Potential changes to TS 103 307AvailableTencastle LimitedOther
 CYBER(17)011027TS 103 307 Update on techniques for assuring digital evidence AvailableTencastle LimitedOther
 CYBER(17)011026Draft proposal for Technical Report on Security techniques for software protectionAvailableGemalto N.V.Other
 CYBER(17)011025ETSI Security Week 2018AvailableETSIOther
 CYBER(17)011024CEN-CENELEC TC 8 July 2017 Meeting notesAvailableETSIOther
 CYBER(17)011023r4Security techniques for protecting software in a white box modelAcceptedGemalto N.V.NWI
 CYBER(17)011023r3Security techniques for protecting software in a white box modelRevisedGemalto N.V.NWI
 CYBER(17)011023r2Security techniques for protecting software in a white box modelRevisedGemalto N.V.NWI
 CYBER(17)011023r1Security techniques for protecting software in a white box modelRevisedGemalto N.V.NWI
 CYBER(17)011023Security techniques for protecting software in a white box modelRevisedGemalto N.V.NWI
 CYBER(17)011022Draft DTR/CYBER-QSC-007 v0.0.4 "QSC-KEX"AcceptedNCSCDraft
 CYBER(17)011021TC CYBER Strategy Latest Draft 0.7AvailableZeata Security LtdOther
 CYBER(17)011020TC CYBER Presentation for Brussels Sept 17th 2017AvailableZeata Security LtdOther
 CYBER(17)011019CYBER-WI-021, TR 103 456, NIS-Directive for approvalNotedRapporteurDraft
 CYBER(17)011018Report 05 Sep 2017 meeting CYBER-WI-021-NIS-DirectiveAvailableRapporteurReport
 CYBER(17)011017LS from SA3 to SAGE cc CYBER on 256-bit algorithms for 5GAvailable3GPP SA 3LSin
 CYBER(17)011016r1New TS 103 523-4, "Cyber, Middlebox Security Protocol, Part 4: Profile for network based IPsec trafficAcceptedCISNWI
 CYBER(17)011016New TS 103 523-4, "Cyber, Middlebox Security Protocol, Part 4: Profile for network based IPsec trafficRevisedCISNWI
 CYBER(17)011015r2New TS 103 523-3 "Cyber, Middlebox Security Protocol, Part 3: Profile for cloud data centre virtual instantiations with TLS based trafficAcceptedCISNWI
 CYBER(17)011015r1New TS 103 523-3 "Cyber, Middlebox Security Protocol, Part 3: Profile for cloud data centre virtual instantiations with TLS based trafficRevisedCISNWI
 CYBER(17)011015New TS 103 523-3 "Cyber, Middlebox Security Protocol, Part 3: Profile for cloud data centre virtual instantiations with TLS based trafficRevisedCISNWI
 CYBER(17)011014Middlebox Structured Ecosystem of Events and Published MaterialsAvailableCISOther
 CYBER(17)011013Revised Annex A, Use Cases and Bibliography Annex for MSP, Part 1AvailableCISOther
 CYBER(17)011012Information on action 9.1 related to CIS feesAvailableCISOther
 CYBER(17)011011Reply LS on data confidentiality and data access control in IoT using Attribute Based EncryptionAvailableoneM2MLSin
 CYBER(17)011010Modification of example eTVRA database to accommodate new textAvailableCadzow CommunicationsCR
 CYBER(17)011009Revision of references and use of text from ISO/IEC 15408-2AvailableCadzow CommunicationsCR
 CYBER(17)011008Reply LS to IETF Security area directors on middleboxAvailableCISLSout
 CYBER(17)011007Reply LS to IETF Security area directors on middleboxReservedCISLSout
 CYBER(17)011006r1Reply LS to IETF Security area directors on middleboxAcceptedZeata Security LtdLSout
 CYBER(17)011006Reply LS to IETF Security area directors on middleboxRevisedZeata Security LtdLSout
 CYBER(17)011005Information on action 9.1 related to CIS feesAvailableETSIOther
 CYBER(17)011004a2SC 27 WG5 drafts after Hamilton April 2017AvailableISO/IEC JTC 1 SC 27LSin
 CYBER(17)011004a1SC 27 WG4 drafts after Hamilton April 2017AvailableISO/IEC JTC 1 SC 27LSin
 CYBER(17)011004ISO/IEC JTC 1/SC 27 liaison statement to ETSI TC CYBERAvailableISO/IEC JTC 1 SC 27LSin
 CYBER(17)011003LS on middlebox from IETF Security Area DirectorsAvailableISOC/IETFLSin
 CYBER(17)011002r1CYBER#11 reportAcceptedETSIReport
 CYBER(17)011002CYBER#11 reportRevisedETSIReport
 CYBER(17)011001r3CYBER#11 agendaAcceptedChairmanAgenda
 CYBER(17)011001r2CYBER#11 agendaRevisedChairmanAgenda
 CYBER(17)011001r1CYBER#11 agendaRevisedChairmanAgenda
 CYBER(17)011001CYBER#11 agendaRevisedChairmanAgenda
 CYBER(17)000136r1Reply LS to ITU-T SG17 on middleboxAcceptedNCSCLSout
 CYBER(17)000136Reply LS to ITU-T SG17 on middleboxRevisedNCSCLSout
 CYBER(17)000135ETSI mcTLS protocol demonstrationAcceptedNCSCNWI