Đang chuẩn bị liên kết để tải về tài liệu:
Securing the sip communications with XML security mechanisms in VoIP application awareness
Không đóng trình duyệt đến khi xuất hiện nút TẢI XUỐNG
Tải xuống
The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality. | International Journal of Computer Networks and Communications Security VOL. 5, NO. 4, APRIL 2017, 83–89 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) Securing the SIP Communications with XML Security Mechanisms in VoIP Application Awareness Abdallah Handoura1, Daniel Bourget2 1, 2 Laboratoire de l’Informatique des Télécommunications, Ecole Nationale Supérieure des Télécommunications de Bretagne France {1abdallah.Handoura, 2daniel.Bourget}@telecom-bretagne.fr ABSTRACT The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality. Keywords: IN, SIP, threats, security, XML, SOAP, VoIP. 1 INTRODUCTION The growing globalization and the liberalization of the market telecommunications, necessitates a more global infrastructure of IN that satisfies needs of different subscribed legal implied, especially for multinational services subscribed. A lot of these services are offered on a current systems, but are often realized with specialists of system. The concepts of IN for given such service is a coherent and stable basis [1]. Some security functions have been introduced already in current systems, but they define constraints to user groups with the private line means, the proprietor equipment and proprietor algorithms or secrets. There is a major difference between the realization of today service (limited) and the goals of the introduction of IN, however, the IN offer its services to a public world, open, and especially to offer the services that allows user groups of communicate by the public transmission .