oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Study on the security of SIP
SIP协议的安全性研究

YU Zhi-chun,FANG Bin-xing,ZHANG Zhao-xin,
俞志春
,方滨兴,张兆心

计算机应用 , 2006,
Abstract: With the widespread use of multimedia communications,SIP(Session Initiation Protocol) is becoming one of the most important protocols in the VoIP field.Facing the complex and open Internet environment,the security of SIP needs to be improved and enhanced.This paper analyzed the security threats to SIP at first,and then proved the existence of these threats by simulated attacking experiments,finally improved the authentication mechanism and provided security solution to SIP.
A Comparative Study of SIP Overload Control Algorithms  [PDF]
Yang Hong,Changcheng Huang,James Yan
Computer Science , 2012,
Abstract: Recent collapses of SIP servers in the carrier networks indicates two potential problems of SIP: (1) the current SIP design does not easily scale up to large network sizes, and (2) the built-in SIP overload control mechanism cannot handle overload conditions effectively. In order to help carriers prevent widespread SIP network failure effectively, this chapter presents a systematic investigation of current state-of-the-art overload control algorithms. To achieve this goal, this chapter first reviews two basic mechanisms of SIP, and summarizes numerous experiment results reported in the literatures which demonstrate the impact of overload on SIP networks. After surveying the approaches for modeling the dynamic behaviour of SIP networks experiencing overload, the chapter presents a comparison and assessment of different types of SIP overload control solutions. Finally it outlines some research opportunities for managing SIP overload control.
Application Router for SIP Servlet
SIP Servlet 应用路由机制

QIU Jie,LIN Hu,YANG Hai-Bo,
仇婕
,林浒,杨海波

计算机系统应用 , 2011,
Abstract: In the system of 3G IMS, SIP application server is the main provider for enriching the content of service. JCP(Java Community Process)defines SIP Servlet Standard to simplify the process and improve the efficiency, which also offers Java application programming interface(API)for SIP application server. The mechanism of application router for SIP Servlet is an important module for rapidly customizing 3G services and it is a hotspot of studying nowadays. In order to implement complex services by composing applications flexibly, this article based on analyzing the application router for SIP Servlet puts forward and realizes a method, which makes use of SailfinV2 standard container to design the custom defined application router, and also expounds how to employ the method according to an instance. Finally, the experiment result reflects the high efficiency and flexibility of newly increased mechanism of application router.
中国封建刑律中的八议  [PDF]
曾炳钧
法学研究 , 1981,
Abstract: “八议”是中国君主专制时期曹魏以后各代王朝在刑律中对于八类权贵人物犯罪所规定的特殊优遇。根据《唐律》八议条,“一曰议亲,二曰议故,三曰议贤,四曰议能,五曰议功,六曰议贵,七曰议勤,八曰议宾。”所谓“亲”是指皇室的某一范围内的亲属;“故”是指皇室的某些故旧;“贤”是朝廷认为“有大德行”;“能”是“有大才业”;“功”是“有大功勋”;“贵”指“职事官三品以上、散官二品以上及爵一品者”;“勤”是“有大勤劳”;“宾”是“承先代之后为国宾者”。
Scilab and SIP for Image Processing  [PDF]
Ricardo Fabbri,Odemir Martinez Bruno,Luciano da Fontoura Costa
Computer Science , 2012,
Abstract: This paper is an overview of Image Processing and Analysis using Scilab, a free prototyping environment for numerical calculations similar to Matlab. We demonstrate the capabilities of SIP -- the Scilab Image Processing Toolbox -- which extends Scilab with many functions to read and write images in over 100 major file formats, including PNG, JPEG, BMP, and TIFF. It also provides routines for image filtering, edge detection, blurring, segmentation, shape analysis, and image recognition. Basic directions to install Scilab and SIP are given, and also a mini-tutorial on Scilab. Three practical examples of image analysis are presented, in increasing degrees of complexity, showing how advanced image analysis techniques seems uncomplicated in this environment.
Proposed Model for SIP Security Enhancement  [PDF]
Munir B. Sayyad, Abhik Chatterjee, S. L. Nalbalwar
Communications and Network (CN) , 2010, DOI: 10.4236/cn.2010.21011
Abstract: This paper aims to examine the various methods of protecting and securing a SIP architecture and also propose a new model to enhance SIP security in certain selected, specific and confidential environments as this proposed method cannot be generalized. Several security measures and techniques have already been experimented with, proposed and implemented by several authors as SIP security is an issue of utmost impor-tance in today’s world. This paper however, aims to summarize some of the better known techniques and propose a unique method of its own. It also aims to mathematically represent SIP fitness values graphically as well via a simulation using the popular Fuzz Data Generation Algorithm. Thus this paper not only aims to contribute to the already vast field of SIP security in an effective manner but also aims to acknowledge and represent some of the fail proof methods and encryption techniques that have helped in making SIP a more secure and less wobbly network for all of us to function in.
sip安全认证机制研究  [PDF]
韦振名 冯久超?
计算机科学 , 2008,
Abstract: 会话发起协议(sip)简单灵活,便于业务扩展,是使用最广泛的信令协议之一。但是它缺乏有效的安全认证机制,容易受到攻击。分析了sip可能受到的攻击,对已有安全认证机制进行比较,并提出一种基于公钥的安全认证机制,增强了sip域内和端到端的安全性。
A Reconfigurable Architecture of SIP in Element Management System
J. Parvathi,B. Karthikeyan
Research Journal of Applied Sciences , 2012, DOI: 10.3923/rjasci.2012.382.386
Abstract: The Element Management System (EMS) is one that is involved in the development of the functionalities of efficient management of network elements like the DSLAMs that handles high speed digital data streams from numerous subscribers, end users and the network service providers. DSLAM is a broadband access network element that supports multiple DSL transmission types (xDSL) and finds advantageous as it provides an efficient way of broadcasting with reliability and scalability and its support to triple play delivery (audio, video and voice supporting). The essence of EMS is to research with network management system (EMS GUI) that provides configuration, maintenance and the FCAPS (Fault management, Configuration management, Accounting management, Security management) management of the network element. This flexibility ensures the enhanced deployment of novel Network Element (NE) releases, enabling high penetration in market for new services. EMS manages the Session Initiation Protocol (SIP) configuration of DSLAMs as being supported by the integration of multiple types of media. There are SIP versions for the hardware of DSLAMs which evolve in parallel, most of the times independently. Generally, the design of the application will have core component and on top of the plugins that are defined for each version of the hardware release. SIP application is like having SIP core and SIP plugins for each DSLAM version which results in making frequent releases of all of these components on every introduction of a new SIP version. This results in lot of cost involvement, every time developing and making releases of the SIP core and plugins. So, the current design of SIP core application and plugins need to be revisited to reduce the redelivery of all of them for each new SIP version thus providing an optimal design of SIP application. The optimal design of SIP application is obtained by moving the SIP components to the SIP core and making a deviant from the plugins that is dependent of each SIP plugins for the new SIP versions that is being introduced. The former is removed from its content thus breaking the link between the plugins and the core for the updation of the new SIP versions. As a result on introduction of every new SIP version the SIP core to be redelivered to the customer instead of redelivering the entire former SIP core and the SIP plugins as both has a dependency for the new SIP version thus resulting in higher performance and cost effective.
Securing SIP: An Easy and Effective Solution  [cached]
Cristian Cojanu
Journal of Mobile, Embedded and Distributed Systems , 2012,
Abstract: Session Initiation Protocol (SIP) has become in recent years a common choice regarding voice communication services because it is a cost effective solution and offers multiple features. Unfortunately, security is not one of them by default. In general, SIP-based solutions implemented in companies or as services on the internet do not offer any kind of privacy or confidentiality. Most companies that use SIP systems rely on the protection offered by a firewall between the LAN and the WAN. Some probably view this as a good compromise. However, when taking into account the fact that a good percentage of the attacks on IT systems come from inside the LAN, it becomes obvious that just the firewall is not enough and in this case not only the IT services are affected, but so do the voice communications system. Because SIP is a text-based protocol similar to HTTP, an attacker can find out not only information like the IP addresses of the phones and of the SIP system but also when, with whom, how long and what someone has talked on the phone. This paper will analyze the current security solutions and our approach to this matter.
Scheme of Mobile Internet Based on SIP Protocol
基于SIP协议的移动Internet解决方案

JIAO Yan-hong,YANG Shen-yuan,
焦燕鸿
,杨莘元

计算机应用研究 , 2005,
Abstract: The development of mobile communication and computer network leads to the demand of the Internet Mobility. First, the paper introduces SIP protocol and mobility using SIP. Then its superiority over Mobile IP is analyzed. Finally, the assumption of mobility management using SIP as the uniform signaling system in Internet is described.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.