A Policy-Based Design Methodology and Performance Evaluation Framework for a Secure VoIP Infrastructure
نویسندگان
چکیده
The increasing interest in telecommunication systems and the wide spreading of computer networks within commercial and scientific field, are going in the direction of a deep integration of phone and data systems into a single network infrastructure. We are particular interested in security issues that arise in such context, thinking, for example, about authentication and billing problems. The available security mechanisms can offer different guarantees but their introduction greatly affect the whole system performances. To guarantee system usability and an efficient resource usage, we propose a design methodology and a framework to evaluate how each security choice affects the whole system performances and help system designers in evaluating the performance-security trade-off.
منابع مشابه
Analysis and Modeling of VoIP Servers: A Linear Programming Approach
The SIP protocol was standardized by the IETF at the application layer for initiating, managing, and terminating multimedia sessions and has been widely used as the main signaling protocol on both the Internet and VoIP networks. Most challenges in this protocol are overload and lack of proper state distribution. These challenges cause a wide range of next-generation network users to face a shar...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملAn ontology-based policy for deploying secure SIP-based VoIP services
— Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the Internet, raises several security issues that must be accounted for. On top of that, there are new sophisticated attacks against VoIP infrastructures that capitalize on vulnerabilities of the protocols employed for the...
متن کاملFrom Mid-Level Policy Analysis to Macro-Level Political Economy; Comment on “Developing a Framework for a Program Theory-Based Approach to Evaluating Policy Processes and Outcomes: Health in All Policies in South Australia”
This latest contribution by the evaluation research team at Flinders University/Southgate Institute on their multiyear study of South Australia’s Health in All Policies (HiAP) initiative is simultaneously frustrating, exemplary, and partial. It is frustrating because it does not yet reveal the extent to which the initiative achieved its stated outcomes; that awaits further papers. It is exempla...
متن کاملطراحی و آزمون مدل ارزیابی محیط دانشآفرین در مراکز پژوهشی اسلامی
Purpose: The present research aims to design and test a model for evaluating the knowledge-creating ‘Ba’ (i.e. environment) in Iranian Islamic research centers based on the Triple-Helix and I-System theories and investigating the effect of personality traits, research environment and the capabilities of researchers and faculty members on the research performance of these centers. Methodology: ...
متن کامل