نتایج جستجو برای: معماری امنیت 805 itu
تعداد نتایج: 43579 فیلتر نتایج به سال:
افزایش تعداد آسیب پذیری ها و پیچیدگی آنها در حوزه تبادل داده و اطلاعات، اهمیت مسئله کمی سازی آسیب پذیری ها را هم به جهت تعیین میزان آن و هم از نظر اولویت دهی و مدیریت منابع، بیش از پیش حائز اهمیت ساخته است. شبکه های رایانه ای به دلیل داشتن جایگاه پر اهمیت در زیر ساخت ارتباطی و تبادل داده ها و اطلاعات همواره در معرض آسیب پذیری های متعددی قرار داشته اند و این مسئله لزوم محاسبه کمی میزان آسیب پذیر...
This paper describes an ontology model (conceptual model) based on the ITU-T Recommendation G.805 for transport network architectures. The goal is to take a step forward to the autonomic applications for transport network operation and management. Besides the conceptual model description and explanation, including its main elements (classes, properties and constraints), this paper also includes...
In recent years, dynamic multi-layer networks have emerged. Unlike regular networks these multi-layer networks allow users and other networks to interface on different technology layers. While path finding on a single layer is currently well understood, path finding on multi-layer networks is far from trivial. Even the constraints (the possible incompatibilities) are not always clear. This pape...
Wireless Mobile Ad hoc NETwork (WMANET) is a group of an independent wireless (Mobile/ Semi Mobile) nodes communicating on a peer-to-peer basis with no preestablished infrastructure. The unique characteristics of WMANET make such networks highly vulnerable to security attacks when compared with wired networks or infrastructure-based wireless networks. This paper proposes a comprehensive, top-do...
In this chapter, a novel performance model for assessing security of a layered network has been proposed. The work is motivated by the fact that there is a need for a reference framework to account for all threats to a networked system. There are few such models available, and one of them is recommended by the International Telecommunications Union (ITU). The proposed assessment model is based ...
This paper proposes management architecture of multi-layer Virtual Private Network over the broadband network that will play an important role at the initial stage of broadband era. To provide flexible management capabilities with the administrator of the VPN, we adopt layering concept and abstraction mechanism to give a simple view of the real connection at service management level. The multil...
Digital Rights Management (DRM) is an umbrella term for any of several arrangements which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be speci ed by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows fre...
Network interoperability may be achieved by a number of different means. This paper addresses the usage of management mechanisms to realize this goal. Where interoperability by means of management systems is concerned, standardization bodies like ITU are frequently associated with standardized network element (NE) models. This paper presents another option, interoperability on the network level...
Digital Rights Management (DRM) is an umbrella term for any of several arrangements which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be speci ed by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows fre...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید