Security Enhancement Architectural Model for IMS based Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IMS Security Analysis using Multi-attribute Model

IP Multimedia Subsystem (IMS) plays as a core platform in next-generation-network architecture, which advocates for an open and inter-operable service infrastructure. However, over the years, not much attention has been paid to the security problem of IMS. The time has come to now address security issues. This paper proposes a multi-attribute stereo model based on X.805 standard, which addresse...

متن کامل

A Model-Based Resilience Analysis for IMS

IMS (IP Multimedia Subsystem) has become the basis of fixed-mobile convergence for telecommunication operators. Compared to previous networks, IMS presents huge advantages, especially in terms of its ability to offer all types of services (voice and data). Nevertheless, with these advantages comes a whole new package of resilience (dependability & security) challenge, e.g., attacks, human mista...

متن کامل

Proposed Model for SIP Security Enhancement

This paper aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized. Several security measures and techniques have already been experimented with, proposed and implemented by several authors as SIP security is an ...

متن کامل

A Genetic Programming-based trust model for P2P Networks

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...

متن کامل

Architectural Model for Information Security Analysis of Critical Information Infrastructures

Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indian Journal of Science and Technology

سال: 2016

ISSN: 0974-5645,0974-6846

DOI: 10.17485/ijst/2016/v9i46/107348