TITLE

Exploring IMS Security Mechanisms

AUTHOR(S)
Bellman, Bob
PUB. DATE
January 2007
SOURCE
Business Communications Review;Jan2007, Vol. 37 Issue 1, p59
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article examines security mechanisms for IP Multimedia Subsystem networks. While basic safeguards for signaling and media traffic are present within the network's specifications, these measures do not defend against denial-of-service attacks or viruses. The author examines IP Multimedia Subsystem security, which is based on hop-by-hop measures designed to protect the links between user devices and the core server, and discusses the potential security vulnerabilities that affect the networks.
ACCESSION #
24209636

 

Related Articles

  • SECURE AGAINST ROGUE DEVICES. Riciputi, Joel // Communications News;Jul2007, Vol. 44 Issue 7, p30 

    The article discusses computer security to protect against rogue devices. Discovering everything that is on the network, accurately classifying all of the devices, monitoring for changes, and providing automated remediation are key building blocks to helping organizations regain control and...

  • Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols. Junghyun Nam; Kim-Kwang Raymond Choo; Juryon Paik; Dongho Won // International Journal of Security & Its Applications;Mar2013, Vol. 7 Issue 2, p47 

    Protocols for password-based authenticated key exchange (PAKE) enable two or more parties communicating over a public network to build a secure communication channel using their easy-to-remember passwords. However, off-line dictionary attacks have always been a major security concern in...

  • STEEL YOURSELF FOR NEW THREATS. Clancy, Heather // CRN;5/9/2005, Issue 1145, p69 

    The article focuses on computer security. In this context, Kaspersky Lab, the Moscow-based security content software developer company said that relatively, it was a quiet first quarter for worms and trojans delivered via e-mail, but security threats are becoming more ominous when it comes to...

  • Never leave it all to your firewall. Bradbury, Danny // Computer Weekly;1/9/2007, p30 

    The article focuses on the issues related to the use of firewalls to protect a computer network from hackers. The battery of anti-hacking measures built into an application firewall can offer a level of protection, but hands-on management is still the key to network security. An application...

  • Protecting Your IT Assets. Stong-Michas, Jennifer // Alaska Business Monthly;Sep2005, Vol. 21 Issue 9, p94 

    Provides tips on protection information technology assets. Importance of vulnerability assessment tools in understanding what exposures are present on the network; Increase in network threats by the shift toward interconnected and interdependent system architectures; Design of...

  • DEFENSE MECHANISMS OF BIOLOGICAL CELLS: A FRAMEWORK FOR NETWORK SECURITY THINKING. Knapp, Kenneth; Morris, Frank; Rainer, Jr., R. Kelly; Byrd, Terry Anthony // Communications of the Association for Information Systems;2003, Vol. 12, p701 

    Computer and network security are central issues confronting organizations and individuals. This paper explores the use of biology as a reference discipline that can provide meaningful insight and innovation in the area of network security. Specifically, we propose a framework for thinking about...

  • PRODUCT PREVIEWS.  // InfoWorld;11/21/2005, Vol. 27 Issue 47, p18 

    This section features several computer products. Ping Identity has released PingFederate Version 3.0, a federated identity management server featuring support for the SAML 2.0 authentication standard. The server is designed to provide Web single sign-on and log-out, as well as attribute...

  • DESIGN AND IMPLEMENTATION OF AN INTRANET SECURITY AND ACCESS CONTROL SYSTEM IN UBI-COM. LEE, Malrey; Nam-Deok CHO; Keun-Kwang LEE; Kyoung-Sook Ko // Computing & Informatics;2011, Vol. 30 Issue 3, p419 

    Currently, most enterprise intranet systems process user information for security and access authentication purposes. However, this information is often captured by unauthorized users who may edit, modify, delete or otherwise corrupt this data. In addition, corruption can result from inaccurate...

  • PC Safety Toolbox: 5 Steps to Protecting Your System. Spector, Lincoln; Lasky, Michael S.; O'Reilly, Dennis; Dahl, Eric // PCWorld;Sep2004, Vol. 22 Issue 9, p162 

    This article presents guidelines in protecting a computer system. Backing up Windows and your applications is not as vital as protecting your data. In an emergency, however, software backups can save you time and aggravation. The perfect system backup program would back up the entire Windows...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics