Application of the Protection Profile to Define Requirements for a Telecommunications Services Contract

نویسندگان

  • Marshall D. Abrams
  • Fidel A. Parraga
  • Joseph M. Veoni
چکیده

Early use of applying the Common Criteria for specifying and acquiring large-scale telecommunications services is described. Lessons learned and examples are described.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

The impact of non-compliance with the legal requirements for disclosure of information on securities transaction

Due to the specific characteristics of securities, in securities contracts it is difficult for the investors to have the information which is necessary for entering into the contract. Accordingly, in accordance with the Securities Market Act and the relevant regulations, the issuers of securities, in the primary and secondary markets, are required to disclose material information about securiti...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

analysis of contract law of commercial expectations in patent license

In this research, protection of commercial expectation has been examined. The main question is how we could identify and assess existence of commercial expectations. In response, commercial expectation are acquisition of expectable benefit in market, mass production, absence of technical failure in licensed knowledge and so on. Therefore, it is essential to response by analysis of contract law ...

متن کامل

Design and Evaluation of an mHealth Application in Self-Management of Post-Traumatic Stress Disorder

Introduction: Recent developments in the use of mobile technologies have given rise to opportunities for more effective and cost-efficient services for people with chronic diseases. Considering the relatively high prevalence of post-traumatic stress disorder (PTSD) in Iran and the lack of a native application for the self-management of many complications of this disorder, the present study aims...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001