Burr, 1991 - Google Patents
Security in ISDNBurr, 1991
View PDF- Document ID
- 9308539602870994529
- Author
- Burr W
- Publication year
- Publication venue
- NIST special publication
External Links
Snippet
The Integrated Services Digital Network (ISDN) standards will provide world-wide digital communications service and will play a key role in the transition to electronic documents and business transactions. ISDN has been developed with little thought to security. ISDN security …
- 238000003825 pressing 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/5825—Message adaptation based on network or terminal capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1484892B1 (en) | Method and system for lawful interception of packet switched network services | |
Kaijser et al. | SESAME: The solution to security for open distributed systems | |
Rotenberg | Communications privacy: Implications for network design | |
EP1075748B1 (en) | Method, arrangement and apparatus for authentication | |
Burr | Security in ISDN | |
Kou | Networking security and standards | |
US20090067421A1 (en) | Method and device for transferring digital information | |
Katz | Social aspects of telecommunications security policy | |
Hopkins et al. | Redefining privacy and security in the electronic communication age: A lawyer's ethical duty in the virtual world of the Internet | |
Novotny | Transborder Data Flow Regulation: Technical Issue of Legal Concern | |
Pollard | Telecom fraud: The cost of doing nothing just went up | |
Buffenoir | Security in the OSI model | |
Berquist et al. | Managing information highways: the PRISM book: principles, methods, and case studies for designing telecommunications management systems | |
Profos | Security requirements and concepts for Intelligent Networks | |
Shirey | Defense Data Network Security Architecture | |
Sailer | Signaling and service interfaces for separating security sensitive telecommunication functions considering multilateral security | |
Claassen et al. | Information security services and standards for telecommunications in Africa | |
Patiyoot | Security issues for wireless ATM networks | |
Wolters | Universal Personal Telecommunications | |
Patiyoot et al. | Security issues for wireless ATM networks | |
Evripidis | Lawful Interception and Countermeasures: In the era of Internet Telephony | |
Kou | Security Architecture Standard | |
Simonson et al. | Dealing with Telephone Toll Fraud | |
Agnew | Secrecy and Privacy in a Local Area Network Environment | |
Clissmann et al. | Security for mobile users of telecommunication services |