[go: up one dir, main page]

Burr, 1991 - Google Patents

Security in ISDN

Burr, 1991

View PDF
Document ID
9308539602870994529
Author
Burr W
Publication year
Publication venue
NIST special publication

External Links

Snippet

The Integrated Services Digital Network (ISDN) standards will provide world-wide digital communications service and will play a key role in the transition to electronic documents and business transactions. ISDN has been developed with little thought to security. ISDN security …
Continue reading at nvlpubs.nist.gov (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/5825Message adaptation based on network or terminal capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
EP1484892B1 (en) Method and system for lawful interception of packet switched network services
Kaijser et al. SESAME: The solution to security for open distributed systems
Rotenberg Communications privacy: Implications for network design
EP1075748B1 (en) Method, arrangement and apparatus for authentication
Burr Security in ISDN
Kou Networking security and standards
US20090067421A1 (en) Method and device for transferring digital information
Katz Social aspects of telecommunications security policy
Hopkins et al. Redefining privacy and security in the electronic communication age: A lawyer's ethical duty in the virtual world of the Internet
Novotny Transborder Data Flow Regulation: Technical Issue of Legal Concern
Pollard Telecom fraud: The cost of doing nothing just went up
Buffenoir Security in the OSI model
Berquist et al. Managing information highways: the PRISM book: principles, methods, and case studies for designing telecommunications management systems
Profos Security requirements and concepts for Intelligent Networks
Shirey Defense Data Network Security Architecture
Sailer Signaling and service interfaces for separating security sensitive telecommunication functions considering multilateral security
Claassen et al. Information security services and standards for telecommunications in Africa
Patiyoot Security issues for wireless ATM networks
Wolters Universal Personal Telecommunications
Patiyoot et al. Security issues for wireless ATM networks
Evripidis Lawful Interception and Countermeasures: In the era of Internet Telephony
Kou Security Architecture Standard
Simonson et al. Dealing with Telephone Toll Fraud
Agnew Secrecy and Privacy in a Local Area Network Environment
Clissmann et al. Security for mobile users of telecommunication services