IMS security and what we should learn from the Internet
نویسندگان
چکیده
The IP Multimedia Subsystem (IMS) was developed by a common initiative of the standardization bodies 3GPP and ETSI TISPAN with the aim to provide a platform for fixed and mobile network operators that supports future communication services. In this article we give an overview about the implications that security threats already known from the Internet have on IMS. We analyze the security requirements of an IMS based network architecture and describe possible security solutions. Finally, we argue that for a secure IMS environment extensive traffic monitoring is required in order to provide IMS-based services in a secure manner.
منابع مشابه
Adopting New International Health Instruments – What Can We Learn From the FCTC?; Comment on “The Legal Strength of International Health Instruments - What It Brings to Global Health Governance?”
This Commentary forms a response to Nikogosian’s and Kickbusch’s forward-looking perspective about the legal strength of international health instruments. Building on their arguments, in this commentary we consider what we can learn from the Framework Convention on Tobacco Control (FCTC) for the adoption of new legal international health instruments.
متن کاملA Global Social Support System: What the International Community Could Learn From the United States’ National Basketball Association’s Scheme for Redistribution of New Talent
If global trade were fair, it is argued, then international aid would be unnecessary and inequalities inherent to the economic system would be justifiable. Here, we argue that while global trade is unfair, in part because richer countries set the rules, we believe that additional interventions must go beyond trade regulation and short-term aid to redress inequalities among countries that will p...
متن کاملمدیر موفق کیست؟
Who is a really successful manager? A manager who spends less money, or the one who earns more? A manager who can survive for a longer period of time, or an administrator who expands his organization, and opens up new branches? Which one is the most successful? The article tries to answer these questions and provides, some simple guidlines for the managers in every domain of management who wan...
متن کاملComputer security in the future
Until recently, computer security was an obscure discipline that seemed to have little relevance to everyday life. With the rapid growth of the Internet, e-commerce, and the widespread use of computers, computer security touches almost all aspects of daily life and all parts of society. Even those who do not use computers have information about them stored on computers. This paper reviews some ...
متن کاملA Secure Architecture for Nomadic User in IMS Network
The IP multimedia subsystem (IMS) is a basis for a significant new architecture which offers network operators the opportunity to expand their services, by integrating voice and multimedia communications and delivering them into new environments with new purposes. Basically, the IMS is an overlay network on top of IP layer that uses Session Initiation Protocol (SIP) as the primary signaling mec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Elektrotechnik und Informationstechnik
دوره 127 شماره
صفحات -
تاریخ انتشار 2010