Towards a new Security Architecture for Telephony.
Carole BassilAhmed SerhrouchniNicolas RouhanaPublished in: ICN/ICONS/MCL (2006)
Keyphrases
- security architecture
- access control
- security policies
- security model
- data integrity
- simulation platform
- security mechanisms
- insider threat
- intrusion detection system
- cloud computing
- data protection
- data security
- security requirements
- resource constrained
- database
- operating system
- intrusion detection
- data processing
- databases