|
Work Item
|
Title
|
Current Status
|
Planned Next Status
|
Planned Procedure
|
SEC
|
1.
|
ETR 367
DTR/SEC-002701
|
Telecommunications security; Guidelines on the relevance of security evaluation to ETSI standards Guidelines on the relevance of security evaluation to ETSI standards
|
|
|
|
2.
|
ETS 300 841
DE/SEC-002309
|
Telecommunications security; Integrated Services Digital Network (ISDN); Encryption key management and authentication system for audiovisual services Encryption key management and authentication system for audiovisual services of ISDN
|
|
|
|
3.
|
ETS 300 840
DE/SEC-002307
|
Telecommunications security; Integrated Services Digital Network (ISDN); Confidentiality system for audiovisual services Confidentiality system for audiovisual services of ISDN
|
|
|
|
4.
|
ETS 300 747
DE/SEC-002308
|
Telecommunications security; Service access control and synchronization for audiovisual services Service access control and synchronization for audiovisual services
|
|
|
|
5.
|
ETR 233
DTR/SEC-002508
|
Telecommunications security; A directory of security features in ETSI standards A directory of security features in ETSI standards
|
|
|
|
6.
|
ES 201 733
DES/SEC-003007-1
|
Electronic Signature Formats Electronic Signature Formats
|
|
|
|
SEC LI
|
7.
|
ES 201 671
RES/SEC-003009
|
Telecommunications security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic Handover interface for the lawful interception (LI) of telecommunications traffic
|
|
|
|
SEC
|
8.
|
ES 201 671
DES/SEC-003003
|
Telecommunications security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic Handover interface for the lawful interception (LI) of telecommunications traffic
|
|
|
|
SEC LI
|
9.
|
ES 201 158
RES/SEC-003015
|
Telecommunications security; Lawful Interception (LI); Requirements for network functions Requirements for lawful interception (LI) network functions
|
|
|
|
SEC
|
10.
|
ES 201 158
DES/SEC-002311
|
Telecommunications security; Lawful Interception (LI); Requirements for network functions Requirements for lawful interception (LI) network functions
|
|
|
|