Quick access
 
Contributions for Meeting CYBER#12
  (View query details here)    Show filter options
  
Refresh Export to...
Default View
To apply filters, please click on Refresh
Drag a column header and drop it here to group by that column
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 85 of 85
 UidTitleStatusSourceType
  
select
select
Data pager
Data pager
1
Items per page
PageSizeComboBox
select
Page 1 of 1, rows 1 to 85 of 85
 CYBER(18)012059Status on middlebox hackathon AvailableNCSCOther
 CYBER(18)012058TC CYBER and GDPR - input for brainstormingAvailableETSIOther
 CYBER(18)012057History of security in ETSIAvailableZeata Security LtdOther
 CYBER(18)012056Reply to LS from ITU-T SG17 on ' Security Requirements and Framework of Using Identity-Based Cryptography Mechanisms in Internet of ThingsAvailableCNITLSout
 CYBER(18)012055CYBER roadmapping brainstorming resultsAvailableISARAOther
 CYBER(18)012054WI-27-30 reportAvailableADVENICA ABOther
 CYBER(18)012053r1Meeting report from WG QSC to TC Cyber plenaryAvailableApproach InfinityReport
 CYBER(18)012053Meeting report from WG QSC to TC Cyber plenaryRevisedApproach InfinityReport
 CYBER(18)012052Draft DTS/CYBER-0019 v0.0.6 TS 103 457 Common interface to transfer sensitive functions to a trusted domainNotedBull SASDraft
 CYBER(18)012051Comments on final draft TS 103 532AvailableETSIOther
 CYBER(18)012050Draft - DTS/CYBER-0024 v0.0.2 "Metrics for Identification of CI"AvailableCadzow CommunicationsDraft
 CYBER(18)012049Quantum-Safe Identity-Based EncryptionAcceptedNCSCNWI
 CYBER(18)012048Migration strategies and recommendations to Quantum-Safe schemesAcceptedCadzow CommunicationsNWI
 CYBER(18)012047Draft - DTS/CYBER-0014 v0.0.9 (TS 103 486 ) "Identity management and naming schema protection mechanisms"NotedCadzow CommunicationsDraft
 CYBER(18)012046Summary report of smartM2M meetingAvailableCadzow CommunicationsOther
 CYBER(18)012045r1Checklist of TC CYBER related standards venuesAvailableCISOther
 CYBER(18)012045Checklist of TC CYBER related standards venuesRevisedCISOther
 CYBER(18)012044a1Addendum to contribution 44 containing CIPSEC presentationAvailableCadzow CommunicationsOther
 CYBER(18)012044Critical Infrastructure Protection project CIPSEC collaboration with CYBERAvailableCadzow CommunicationsOther
 CYBER(18)012043Draft DTR/CYBER-0010 v0.0.5 TR 103 370 Practical introductory guide to privacyNotedKATDraft
 CYBER(18)012042ETSI standards in support of cybersecurity certificationAvailableETSIOther
 CYBER(18)012041proposals for Delegated Acts for data security & privacy within RED directiveAvailableETSIOther
 CYBER(18)012040CEN-CENELEC position paper on Cybersecurity RegulationAvailableETSIOther
 CYBER(18)012039ETSI position paper on Cybersecurity RegulationAvailableETSIOther
 CYBER(18)012038Proposed Cybersecurity RegulationAvailableETSIOther
 CYBER(18)012037Draft - RTS/CYBER-0022 v4.2.2 (TS 102 165-2 ) "Methods and Protocols for Security Part 2: Counter Measures"AvailableCadzow CommunicationsDraft
 CYBER(18)012036Draft - RTS/CYBER-0022 v4.2.2 (TS 102 165-2 ) "Methods and Protocols for Security Part 2: Counter Measures"WithdrawnCadzow CommunicationsDraft
 CYBER(18)012035Survey of MSP related platformsAvailableCISOther
 CYBER(18)012034Draft - DTS/CYBER-0027-1 v0.0.11 (TS 103 523-1 ) "Middlebox - Part 1"NotedADVENICA ABDraft
 CYBER(18)012033DTS-020 comment dispositionAvailableCNITOther
 CYBER(18)012032r1STF 529 Final ReportAcceptedCNITOther
 CYBER(18)012032STF 529 Final ReportRevisedCNITOther
 CYBER(18)012031r4Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model"NotedGemalto N.V.Draft
 CYBER(18)012031r3Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model"WithdrawnGemalto N.V.Draft
 CYBER(18)012031r2Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model"WithdrawnGemalto N.V.Draft
 CYBER(18)012031r1Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model"RevisedGemalto N.V.Draft
 CYBER(18)012031Draft - DTR/CYBER-0029 v "Security techniques for protecting software in a white box model"RevisedGemalto N.V.Draft
 CYBER(18)012030Draft - DTS/CYBER-0027-2 v0.0.6 (TS 103 523-2 ) "Middlebox - Part 2"NotedADVENICA ABDraft
 CYBER(18)012029Draft - DTS/CYBER-0027-1 v0.0.10 (TS 103 523-1 ) "Middlebox - Part 1"NotedADVENICA ABDraft
 CYBER(18)012028Review of recent activity in CI identification WithdrawnCadzow CommunicationsOther
 CYBER(18)012027r1Review of necessary updates to TS 102 165-2 AvailableCadzow CommunicationsOther
 CYBER(18)012027Review of necessary updates to TS 102 165-2 RevisedCadzow CommunicationsOther
 CYBER(18)012026Distributed ledger techniques in Identity ProtectionAvailableCadzow CommunicationsOther
 CYBER(18)012025Role of SAREF in Identity Management AvailableCadzow CommunicationsOther
 CYBER(18)012024Work item 14v008NotedCadzow CommunicationsDraft
 CYBER(18)012023Work item 14v007NotedCadzow CommunicationsDraft
 CYBER(18)012022Update on work item 14 - Identity ManagementAvailableCadzow CommunicationsOther
 CYBER(18)012021Draft - DTS/CYBER-0020 v0.0.15 (TS 103 458 ) "Application of ABE for data protection on smart devices, cloud and mobile services"NotedCNITDraft
 CYBER(18)012020r1Demonstration of CP-WATERS-KEM schemeAvailableIBIT AmbrosiniOther
 CYBER(18)012020Demonstration of CP-WATERS-KEM schemeRevisedIBIT AmbrosiniOther
 CYBER(18)012019Contribution to DTS-025 from stakeholdersAvailableCNITOther
 CYBER(18)012018Supporting material for new work item on assuring digital evidenceAvailableTencastle LimitedOther
 CYBER(18)012017r1Report on techniques for assurance of ?digital ?material used in legal proceedings.AcceptedTencastle LimitedNWI
 CYBER(18)012017Report on techniques for assurance of ?digital ?material used in legal proceedings.RevisedTencastle LimitedNWI
 CYBER(18)0120165G Security OverviewAvailableTencastle LimitedOther
 CYBER(18)012015Text for TS 103 523-3, Part 3: Profile for data centre TLMSPAvailableCISOther
 CYBER(18)012014r1Draft - DTS/CYBER-0025 v0.0.6 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control"AcceptedCNITDraft
 CYBER(18)012014Draft - DTS/CYBER-0025 v0.0.6 (TS 103 532 ) "Attribute Based Encryption for Attribute Based Access Control"RevisedCNITDraft
 CYBER(18)012013Final revised draft TS 103 307 v1.2.4 Security Aspects for LI and RD InterfacesAcceptedTencastle LimitedDraft
 CYBER(18)012012r1Changes to TR103331 Structured threat information sharingAcceptedCISNWI
 CYBER(18)012012Changes to TR103331 Structured threat information sharingRevisedCISNWI
 CYBER(18)012011a1Full PDF text of ETL 2017AvailableCadzow CommunicationsOther
 CYBER(18)012011ENISA Threat Landscape Report and Web-AppAvailableCadzow CommunicationsOther
 CYBER(18)012010Disposition of comments received from JTC8 on TR 103-370AvailableKATOther
 CYBER(18)012009EC presentation to MSP on cybersecurity packageAvailableETSIOther
 CYBER(18)012008a2SC 27 WG5 roadmapAvailableETSIOther
 CYBER(18)012008a1CD 27552 extension to 27001 and 27002 for privacy managementAvailableETSIOther
 CYBER(18)012008Notes from ISO/IEC JTC 1 SC 27 meetingAvailableETSIOther
 CYBER(18)012007CEN/CLC JTC8 comments on ETSI Draft TR 103 370AvailableCEN/CLC JTC8Other
 CYBER(18)012006LSOut reply to TC Cyber Common interface to transfer sensitive functions to a trusted domainAvailableNFV SECLSin
 CYBER(18)012005r1CR to version 1.2.1 of TS 103 307 showing changes made on call in yellowAcceptedTencastle LimitedCR
 CYBER(18)012005CR to version 1.2.1 of TS 103 307RevisedTencastle LimitedCR
 CYBER(18)012004LS Call for Inputs to EC Expert Group on RRSAvailableRRSLSin
 CYBER(18)012003NGMN Paper on 5G End-to-End Architecture FrameworkAvailableETSILSin
 CYBER(18)012002CYBER#12 reportAcceptedETSIReport
 CYBER(18)012001r4CYBER#12 agendaAvailableETSIAgenda
 CYBER(18)012001r3CYBER#12 agendaRevisedETSIAgenda
 CYBER(18)012001r2CYBER#12 agendaRevisedETSIAgenda
 CYBER(18)012001r1CYBER#12 agendaRevisedETSIAgenda
 CYBER(18)012001CYBER#12 agendaRevisedETSIAgenda
 CYBER(18)000024LS to ITU-T SG17 LS70 about Middlebox work items in TC CyberAvailableNCSCLSout
 CYBER(18)000023Disposition of comments received from JTC8 on TR 103-370AvailableKATOther
 CYBER(18)000022r1 Facilitating the uptake of cybersecurity standardsAvailableNCSCLSout
 CYBER(18)000022 Facilitating the uptake of cybersecurity standardsRevisedNCSCLSout
 CYBER(17)000143Update to TS 103 307 Annex A.3AcceptedTencastle LimitedNWI