Creating a new security for tomorrow's communication networks and information systems

被引:0
|
作者
Riguidel, M
机构
[1] Thomson CSF, Commun, Adv Informat Technol Dept, F-92231 Gennevilliers, France
[2] Thomson CSF, Comsys, F-92231 Gennevilliers, France
来源
ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS | 2000年 / 55卷 / 7-8期
关键词
security; telecommunication network; information system; protection; internet; review;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The article provides a global overview of modern security issues in the future communication networks. It presents a prospective viewpoint of Internet and mobile security, and gives many starting points to research on. The author describes the limitations of current communication security in the rising multimedia communication age, the need for more complex/subtle security mechanisms and policies. This article starts with a review of the new threats and vulnerabilities created by the emergence of digital technology, multimedia, mobility, heterogeneity and the characteristic, openness and interconnectability of systems. Emphasis is made on the distinction between the content of the users' information and the content of the systems (container), meaning the basic network hardware and software infrastructure. With the trend toward configurable,mobile infrastructures, threats arising from this dynamism are emerging. The solution to these vulnerabilities lies in designing new intermediation services to manage the interfaces between telecom operators, users and service providers, offering security protocols yet to be invented. Finally the author gives an overview of possible future developments and research areas that need to be explored to provide security in the future communication networks. This includes (1) Specification of policies compatible with the Content and the Container, (2) Set up of a context-oriented, plural, configurable policy, (3) Design of new encryption protocols, (4) Placing cryptology and steganography in perspective and (5) Introducing security in an open world.
引用
收藏
页码:401 / 418
页数:18
相关论文
共 50 条
  • [31] Data Communication Crypto Protocol for Security Systems Sensor Networks
    Bykovyy, P.
    Kochan, V.
    Kinakh, Y.
    Sachenko, A.
    Roshchupkin, O.
    Aksoy, S.
    Markowsky, G.
    2009 IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2009, : 375 - +
  • [32] Security Threats Against the Communication Networks for Traffic Control Systems
    Fan, Huipu
    Dong, Yizhou
    Yu, Ming
    Tung, Leonard
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4783 - 4788
  • [33] Security Assessment of Communication Networks for Integrated Substation Automation Systems
    Gao, Huisheng
    Dai, Xuejiao
    INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 448 - 455
  • [34] The Method of Generation Security Profile for Communication Networks and Switching Systems
    Dudykevych, V. B.
    Garasym, Y. R.
    EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS: PROCEEDINGS OF THE XTH INTERNATIONAL CONFERENCE CADSM 2009, 2009, : 82 - 84
  • [35] Creating tomorrow's specialty chemical business
    Christopher, FN
    CHEMTECH, 1998, 28 (02) : 55 - 57
  • [36] Creating a Pipeline for Tomorrow's Nurse Researchers
    Deatrick, Janet A.
    Given, Barbara
    RESEARCH IN NURSING & HEALTH, 2011, 34 (03) : 171 - 175
  • [37] Health Care Communication Networks Disseminating Employee Information for Hospital Security
    Sumner, Jennifer
    Liberman, Aaron
    Rotarius, Timothy
    Wan, Thomas T. H.
    Eaglin, Ronald
    HEALTH CARE MANAGER, 2009, 28 (04) : 287 - 298
  • [38] A novel crypt-stego technique for information security in communication networks
    Singhania, Surbhi
    Gupta, Shailender
    Bhushan, Bharat
    Nain, Ajay
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2013, 6 (02) : 87 - 102
  • [39] Being analog: Creating tomorrow's libraries
    McKinzie, S
    GOVERNMENT INFORMATION QUARTERLY, 2001, 18 (01) : 72 - 73