Making the Distribution Subsystem Secure
نویسندگان
چکیده
Entity Coordinator Entity Consistency Protocol DSS Process Process DSS
منابع مشابه
Availability of k-out-of-n: F Secondary Subsystem with General Repair Time Distribution
In this paper we study the steady state availability of main k-out-of-n: F and secondary subsystems having general repair time distribution. When more than k units of main subsystem fail, then the main subsystem shuts off the secondary subsystem. The life time distributions of the main units and that of secondary subsystem are exponentially distributed. A repair facility having single repairman...
متن کاملRealizing Peer-to-Peer Location-Based Services in Mobile Networks
Current Location Based Services (LBS) in GSM/UMTS Networks rely on centralized Location Enabling Servers [8] for location information provisioning via the Gateway Mobile Location Center (GMLC) Le interface. In this Paper, we present a framework for providing Peer-to-Peer Location-Based Services using de-centralized location information management. The proposed solution relies on the future IP M...
متن کاململزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملA New Authentication Mechanism and Key Agreement Protocol for SIP Using Identity-based Cryptography
The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP (VoIP) calls. IETF SIP standards do not specify a secure authentication process thus allowing malicious parties to impersonate other parties or to charge calls to other parties. This paper proposes an extension to the SIP protocol that uses an identity-based authentication mechanism and key agreement prot...
متن کاملJoint Fingerprinting and Encryption in the DWT Domain for Secure M2M Communication
Machine-to-machine (M2M) communication is viewed as one of the next frontiers in wireless communications. Because of unguarded communication, new security threats emerge. Considering that multimedia will be widely used in various applications over M2M network, it is very urgent to meet new security requirements for multimedia communication. This paper focuses on a joint fingerprinting and encry...
متن کامل