This paper aims at defining security levels of a Voice over IP infrastructure during its design phase. The proposed technique uses security policies to express the security statements that could be adopted, and the policy evaluation is based on security metrics to compare policies. The technique first step consists of policy structure definition; the proposed approach will be applied on the target VoIP infrastructure. In the second step of the technique, the policy will be used to define reference levels against which a security designer can evaluate his design choice or compare the adopted security solution with existing ones. © 2005 IEEE.
Security design and evaluation in a VoIP secure infrastracture: A policy based approach / Casola, V.; Rak, M.; Mazzeo, A.; Mazzoccca, N.. - 1:(2005), pp. 727-732. (Intervento presentato al convegno ITCC 2005 - International Conference on Information Technology: Coding and Computing tenutosi a Las Vegas, NV, usa nel 2005) [10.1109/itcc.2005.254].
Security design and evaluation in a VoIP secure infrastracture: A policy based approach
Casola V.;Rak M.;Mazzoccca N.
2005
Abstract
This paper aims at defining security levels of a Voice over IP infrastructure during its design phase. The proposed technique uses security policies to express the security statements that could be adopted, and the policy evaluation is based on security metrics to compare policies. The technique first step consists of policy structure definition; the proposed approach will be applied on the target VoIP infrastructure. In the second step of the technique, the policy will be used to define reference levels against which a security designer can evaluate his design choice or compare the adopted security solution with existing ones. © 2005 IEEE.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.