Quick access
 
Contributions for Meeting CYBER#10
  (View query details here)    Show filter options
  
Refresh Export to...
Default View
To apply filters, please click on Refresh
Drag a column header and drop it here to group by that column
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 61 of 61
 UidTitleStatusSourceType
  
select
select
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 61 of 61
 CYBER(17)010042oneM2M presentation to TC CYBERAvailableGemalto N.V.Other
 CYBER(17)010041ENISA input to ETSI TC CYBERAvailableENISAOther
 CYBER(17)010040QSC#2 report to CYBERAvailableApproach InfinityOther
 CYBER(17)010039STF 529 presentation to 5G ENSURE Workshop on 16th June 2017 (ETSI Security week 2017)AvailableCNITOther
 CYBER(17)010038r2Middlebox SecurityAcceptedBT plcLSout
 CYBER(17)010038r1Middlebox SecurityRevisedBT plcLSout
 CYBER(17)010038Middlebox SecurityRevisedBT plcLSout
 CYBER(17)010037Draft - DTS/CYBER-0014 v0.0.6 (TS 103 486 ) "Identity management and naming schema protection mechanisms"NotedCadzow CommunicationsDraft
 CYBER(17)010036r1Making CYBER draft deliverables publicAcceptedETSIOther
 CYBER(17)010036Making CYBER draft deliverables publicRevisedETSIOther
 CYBER(17)010035Summary of progress on WI 27 (MSP) AvailableADVENICA ABOther
 CYBER(17)010034Proposal to address robocalls made to NTECH for re-consideration by CYBERAvailableCadzow CommunicationsOther
 CYBER(17)010033Draft - DTS/CYBER-0013 v0.0.5 (TS 103 485 ) "Privacy assurance and verification"NotedCadzow CommunicationsDraft
 CYBER(17)010032Draft - DTS/CYBER-0014 v0.0.5 (TS 103 486 ) "Identity management and naming schema protection mechanisms"NotedCadzow CommunicationsDraft
 CYBER(17)010031Draft of RRS document TR 103 087AvailableIBIT AmbrosiniOther
 CYBER(17)010030QSC Extended RoadmapAcceptedISARANWI
 CYBER(17)010029Summary of latest changes to ETSI DirectivesAvailableETSIOther
 CYBER(17)010028report on discussion with IoTSF and way forwardAvailableZeata Security LtdOther
 CYBER(17)010027Early Draft DTS/CYBER-0019 v0.0.2 (TS 103 457) Common interface to transfer sensitive functions to a trusted domain."NotedBull SASDraft
 CYBER(17)010026Reply LS from SA3 on middlebox securityAvailable3GPP SA 3LSin
 CYBER(17)010025r1Overview of ZONeSec projectAvailableETSIOther
 CYBER(17)010025Overview of ZONeSec projectRevisedETSIOther
 CYBER(17)010024r1LS to oneM2M on data confidentiality and data access control in IoT using Attribute Based EncryptionAcceptedCNITLSout
 CYBER(17)010024LS to oneM2M on data confidentiality and data access control in IoT using Attribute Based EncryptionRevisedCNITLSout
 CYBER(17)010023r3Middlebox Security Protocol; Part 2: DefinitionAcceptedADVENICA ABNWI
 CYBER(17)010023r2Middlebox Security Protocol; Part 2: DefinitionRevisedADVENICA ABNWI
 CYBER(17)010023r1Middlebox Security Protocol; Part 2: DefinitionRevisedADVENICA ABNWI
 CYBER(17)010023Middlebox Security Protocol; Part 2: Specification - mcTLSRevisedADVENICA ABNWI
 CYBER(17)010022Draft - DTS/CYBER-0027 v0.0.5 (TS 103 523 ) "MSP"NotedADVENICA ABDraft
 CYBER(17)010021FAQ for the Middlebox Security Protocol work itemAvailableYaana LimitedOther
 CYBER(17)010020Working draft CYBER-WI-021-NIS-Directive Technical ReportAvailableRapporteurOther
 CYBER(17)010019Report 17 May 2017 meeting CYBER-WI-021-NIS-DirectiveAvailableRapporteurReport
 CYBER(17)010018r1Draft - DTS/CYBER-0025 v0.0.1 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control"NotedCNITDraft
 CYBER(17)010018Draft - DTS/CYBER-0025 v0.0.1 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control"RevisedCNITDraft
 CYBER(17)010017r1STF 529 – Progress Report for ETSIAcceptedCNITOther
 CYBER(17)010017STF 529 – Progress Report for ETSIRevisedCNITOther
 CYBER(17)010016Proposal for development of Work Item 22 over the next 6 monthsAvailableCadzow CommunicationsOther
 CYBER(17)010015Draft - DTS/CYBER-0020 v0.0.5 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services"NotedCNITDraft
 CYBER(17)010014Notice of progress on publication of TS 102 165-1AvailableCadzow CommunicationsOther
 CYBER(17)010013a1Draft of RRS document TS 103 436AvailableCadzow CommunicationsOther
 CYBER(17)010013Summary report on security activity in TC RRSAvailableCadzow CommunicationsOther
 CYBER(17)010012Summary of progress on work item 24 (CI metrics)AvailableCadzow CommunicationsOther
 CYBER(17)010011Summary of progress on work item 13 (privacy assurance methods)AvailableCadzow CommunicationsOther
 CYBER(17)010010Summary of progress on work item 14 (Identity Management)AvailableCadzow CommunicationsOther
 CYBER(17)010009a1Attachments to CYBER(17)01009AvailableCadzow CommunicationsOther
 CYBER(17)010009Notes from ERNCIP CoU Standards Governance meetingAvailableCadzow CommunicationsOther
 CYBER(17)010008r2Update of WI-027 to split it in 2 parts – Part 1 Capability ProfileAcceptedADVENICA ABOther
 CYBER(17)010008r1Update of WI-027 to split it in 2 parts – Part 1 Capability ProfileRevisedADVENICA ABOther
 CYBER(17)010008Update of WI-027 to split it in 2 parts – Part 1 scopeRevisedADVENICA ABOther
 CYBER(17)010007Creation of the new CEN-CLC/TC ‘Cybersecurity and data protection’AvailableETSIOther
 CYBER(17)010006LS from ISG NFV SEC on Initialisation Security for POIsAvailableNFV SECLSin
 CYBER(17)010005TC Cyber QSC Extended RoadmapAvailableISARAOther
 CYBER(17)010004Reply LS from SA3LI on Middlebox Security ProtocolAvailable3GPP SA 3 LILSin
 CYBER(17)010003Liaison statement from ISO/IEC JTC 1/SC 27/WG 4 to ETSI TC CYBERAvailableISO/IEC JTC 1/SC 27/WG 4LSin
 CYBER(17)010002CYBER#10 reportAcceptedETSIReport
 CYBER(17)010001r3CYBER#10 agendaAcceptedETSIAgenda
 CYBER(17)010001r2CYBER#10 agendaRevisedETSIAgenda
 CYBER(17)010001r1CYBER#10 agendaRevisedETSIAgenda
 CYBER(17)010001CYBER#10 agendaRevisedETSIAgenda
 CYBER(17)000092CSCG report to TC cyber #10AvailableKATReport
 CYBER(17)000090Report on go to meeting on TR 103 370 V0.0.2AvailableKATReport