IP as the Platform

March 2008
Security: Solutions for Enterprise Security Leaders;Mar2008, Vol. 45 Issue 3, p64
Trade Publication
The article discusses the use of the Internet Protocol (IP) for communications as an access control systems in business enterprises. It highlights the three factors behind the progressive development of IP connectivity including its inexpensive computer components. According to the author, IP access platform design helps eliminate the possibility that high-security access systems will fail into a default mode if a problem occurs in the central server.


Related Articles

  • A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Zhang, Liping; Tang, Shanyu; Zhu, Shaohui // Peer-to-Peer Networking & Applications;Jan2016, Vol. 9 Issue 1, p108 

    Session Initiation Protocol (SIP) is an essential part of most Voice over Internet Protocol (VoIP) architecture. Although SIP provides attractive features, it is exposed to various security threats, and so an efficient and secure authentication scheme is sought to enhance the security of SIP....

  • Session Initiation Protocol Security: A Brief Review. Jaber, Aws Naser; Chen-Wei Tan; Manickam, Selvakumar; Khudher, Ali Abdulrazzaq // Journal of Computer Science;2012, Vol. 8 Issue 3, p348 

    Problem statement: This study aims to discuss several issues on session initiation protocol security and threats. An in-depth investigation related to SIP with the intention to categorize the wide variety of SIP security issues. Approach: Related papers to the infrastructure of SIP security were...

  • THE INSIDER'S TRACK TO LEVERAGING CONTACT CENTER INNOVATION TODAY. Neary, Tom // Business Communications Review;Mar2006, Vol. 36 Issue 3, pS2 

    The article reflects on the author's perspective of the innovation of the Internet protocol communications. It shows that the innovation creates greater productivity, increase profit and foster relationship with customer. It mentions the opportunities and how to improve the relationship with...

  • Cisco takes security to new level. Duffy, Jim // Network World;12/10/2007, Vol. 24 Issue 48, p14 

    The article reports on the launching of Cisco's TrustSec, the company's latest network, in the U.S. It is intended to determine, through policies, the role of users and devices in the network before granting them access to resources. The platform is practiced in applications for years and now...

  • Anonymous Biometric Access Control. Shuiming Ye; Ying Luo; Jian Zhao; Sen-Ching S. Cheung // EURASIP Journal on Information Security;2009, p1 

    Access control systems using the latest biometric technologies can offer a higher level of security than conventional password-based systems. Their widespread deployments, however, can severely undermine individuals' rights of privacy. Biometric signals are immutable and can be exploited to...

  • IP-PBXs For SMBs: From Avaya To Zultys. Mier, Edwine E.; Mier, David C.; Tarpley, Robert B.; Mosco, Anthony P. // Business Communications Review;Mar2006, Vol. 36 Issue 3, p34 

    The article focuses on the performance and features of Internet protocol-telephony systems designed for small-to-medium business enterprise. The systems were derived form Avaya, Zultys, Pingtel and Vonexus and were tested, compared and surveyed according to the criteria of systems design,...

  • ARP Cache Poisoning Attack and Detection. Al-Qarni, Fatimah mohammed // International Journal of Computer Science & Information Security;Jul2012, Vol. 10 Issue 7, p69 

    The article offers information on the address resolution protocol (ARP) cache poisoning. ARP refers to transmission control protocol/Internet protocol (TCP/IP) used by computers to map IP to physical addresses. It describes how, ARP cache poisoning attack can be conducted, how password stealing...

  • IBC-based Authentication Protocols and a Method of Data Sharing for Cloud Systems. Kangkang Chen; Chenlei Cao; Jianyi Liu; Ru Zhang // Advanced Materials Research;7/24/2014, Vol. 989-994, p2349 

    In Recent years, the rapid development of cloud computing promotes the technological innovation. In the meantime, the security of cloud attracts many researchers. In this paper, a security architecture is proposed to provide a trust communication mechanism between entities in the cloud. Based on...

  • Tested Evaluation of Fast and Secure Handover in FMIPv6. Khan, Shoaib; Loo, K. K.; Kiani, A. K. // International Journal of Communication Networks & Information Se;Apr2010, Vol. 2 Issue 1, p60 

    In next generation all-IP based networks, a large number of mobile nodes are expected to use MIPv6 protocol for mobility. In mobile environment one frequent cause of service disruption is handovers. When MN moves, at some point MN will reach the physical border of its current wireless network...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics