Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based Approach.
Valentina CasolaMassimiliano RakAntonino MazzeoNicola MazzoccaPublished in: ITCC (1) (2005)
Keyphrases
- design process
- security issues
- security requirements
- security level
- functional requirements
- software architecture
- network security
- key management
- security measures
- security management
- authentication protocol
- electronic voting
- access control
- cryptographic protocols
- security model
- security protocols
- data integrity
- security analysis
- optimal policy