期刊文献+

合法侦听原型系统的设计与实现 被引量:2

Design and implementation of prototype system for lawful interception
下载PDF
导出
摘要 合法侦听在协助执法机构打击犯罪方面起着极其重要的作用,是网络和信息安全的重要课题。针对SIP电话网络,讨论了合法侦听原型系统的设计与实现,并系统地分析了原型系统的参考模型及其模块实现,最后,给出了原型系统的运行流程。 Lawful interception (LI) plays a crucial role in assisting law enforcement agencies to combat criminal activities, therefore it is an essential part of network and information security. Based on SIP telephony network, this paper discusses the design terception and analyses the reference model and flow of the prototype system is presented. and implementation of a prototype system for lawful infunctional modules of the system. Finally, the operational flow of the prototype system is presented.
出处 《重庆邮电学院学报(自然科学版)》 2005年第5期571-574,共4页 Journal of Chongqing University of Posts and Telecommunications(Natural Sciences Edition)
关键词 信息安全 合法侦听 软交换 SIP电话 information security lawful interception softswitch SIP phone
  • 相关文献

参考文献4

  • 1CHEN Zhi~1 WANG Ru-chuan~(1,2)1.Department of Computer Science and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,P.R.China,2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing 210093,P.R.China.Study of the Security in Network Management Based on Mobile Agents[J].The Journal of China Universities of Posts and Telecommunications,2004,11(4):37-42. 被引量:2
  • 2TIA/EIA/IS-J-STD-025-A-2000.Lawfully Authorized Electronic Surveillance[S].
  • 3ETSI TS 101 331 V1.1.1-2001.Requirements of Law Enforcement Agencies[S].
  • 4ISC. V 1.2-2002.Reference Architecture[S].

二级参考文献15

  • 1[4]PULIAFITO A, TOMARCHIO O. Using mobile agent to implement flexible management strategies [ J ]. Computer Communication, 2000, 23 (8): 708 - 719.
  • 2[5]BIESZCZAD A, PAGUREK B, WHITE T. Mobile agents for network management [ J ]. IEEE Communication Surveys, 1998,1 (1):2-9.
  • 3[7]REISER H, Vogt G. Security requirements for management systems using mobile agents [A]. Proceedings of the Fifth IEEE Symposium on Computers & Communications (ISCC 2000) [C]. Antibes(France): 2000. 160- 165.
  • 4[8]STALLINGS W. SNMP, SNMPv2 and RMON: Practical Network Management [M]. Reading(MA): Addison-Wesley, 1999.
  • 5[9]YANG Jia-hai, REN Xian-kun, WANG Pei-yu. Principles and realization technology of network management [ M ].Beijing(China): Tsinghua University Press, 2000.
  • 6[11]BORSELIUS N. Mobile agent security [J]. Electronics & Communication Engineering Journal, 2002, 14 (5): 211- 218.
  • 7[12]CORRADI A, MONTANA RI R, STEFANELLI C. Security issues in mobile agent technology [ A]. Proceedings of 7th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 99)[C]. Cape Town, South Africa, 1999. 3 - 8.
  • 8[13]BIERMAN E, CLOTE E. Classification of Malicious Host Threats in Mobile Agent Computing [A]. Proceedings of the 2002 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology [ C ]. Port Elizabeth(South Africa): 2002. 141 - 148.
  • 9[14]WILLELM U G, STAAMANN S M, BUTTYAN L. A pessimistic approach to trust in mobile agent platforms [J].IEEE Intemet Computing, 2000, 4(5): 40 - 48.
  • 10[15]CHEN Zhi-qun. Java Card (tm) Technology for Smart Cards: Architecture and Programmer's (The Java Series)[M]. Reading(MA): Addison-Wesley, 2000.

共引文献1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部