An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
نویسنده
چکیده
منابع مشابه
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN1
depicts requirements for signalling interfaces over which Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensitive data. Modern services, e.g. call forwarding, tele-conferencing, and voice mail services use or store personal data to implement individual services. Sensit...
متن کاملResource Management and Access Control in ISDN Remote Access Environments
The integrated services digital network (ISDN) is one of the most promoted telecommunication services of the 1990’s. As being the natural evolutionary path of the public switched telephone network (PSTN), ISDN has reached a high acceptance in many countries. Even though broadband networks such as asynchronous transfer mode (ATM) promise to offer transmission rates in the multi-megabit area, ISD...
متن کاملMultilaterally Secure Ubiquitous Auditing
Tracking information of individuals is a useful input to many Ubiquitous Computing (UbiComp) applications. Consider the example of a smart emergency management application: once mobile first responders are continuously tracked, a precise and safe coordination of rescue missions is possible, and also mission logs can be created for audit purposes. However, continuously tracking users and storing...
متن کاملMultilaterally secure pervasive cooperation
People tend to interact and communicate with others throughout their life. In the age of pervasive computing, information and communication technology (ICT) that is no longer bound to desktop computers enables digital cooperations in everyday life and work in an unprecedented manner. However, the privacy and IT security issues inherent in pervasive computing are often associated with negative c...
متن کاملA Model to Specify Security Protocols on the Isdn
In this paper, a general model to incorporate security services in the Integrated Services Digital Network (ISDN) is proposed. As an example to prove the model, a security protocol based on public key encryption is proposed. The data units of the security protocol are incorporated to the network layer protocol, Q.931, as an integrating part of the “user-user” information element content in the ...
متن کامل