نتایج جستجو برای: معماری امنیت 805 itu

تعداد نتایج: 43579  

ژورنال: :پژوهشنامه پردازش و مدیریت اطلاعات 0
شهریار محمدی shahriyar mohammadi khajeh nasir toosi universityدانشگاه خواجه نصیر الدین طوسی محمد حسین شرکت mohammad hossein sherkat university of tehranدانشگاه تهران مونا جامی پور mona jami pour university of tehranدانشگاه تهران

افزایش تعداد آسیب پذیری ها و پیچیدگی آنها در حوزه تبادل داده و اطلاعات، اهمیت مسئله کمی سازی آسیب پذیری ها را هم به جهت تعیین میزان آن و هم از نظر اولویت دهی و مدیریت منابع، بیش از پیش حائز اهمیت ساخته است. شبکه های رایانه ای به دلیل داشتن جایگاه پر اهمیت در زیر ساخت ارتباطی و تبادل داده ها و اطلاعات همواره در معرض آسیب پذیری های متعددی قرار داشته اند و این مسئله لزوم محاسبه کمی میزان آسیب پذیر...

2010
Maxwell E. Monteiro Anilton Salles Garcia Pedro Paulo F. Barcelos Giancarlo Guizzardi

This paper describes an ontology model (conceptual model) based on the ITU-T Recommendation G.805 for transport network architectures. The goal is to take a step forward to the autonomic applications for transport network operation and management. Besides the conceptual model description and explanation, including its main elements (classes, properties and constraints), this paper also includes...

Journal: :Computer Networks 2008
Freek Dijkstra Bert Andree Karst Koymans Jeroen van der Ham Paola Grosso Cees T. A. M. de Laat

In recent years, dynamic multi-layer networks have emerged. Unlike regular networks these multi-layer networks allow users and other networks to interface on different technology layers. While path finding on a single layer is currently well understood, path finding on multi-layer networks is far from trivial. Even the constraints (the possible incompatibilities) are not always clear. This pape...

2007
Iman Almomani Hussein Zedan

Wireless Mobile Ad hoc NETwork (WMANET) is a group of an independent wireless (Mobile/ Semi Mobile) nodes communicating on a peer-to-peer basis with no preestablished infrastructure. The unique characteristics of WMANET make such networks highly vulnerable to security attacks when compared with wired networks or infrastructure-based wireless networks. This paper proposes a comprehensive, top-do...

Journal: :International journal of computer science & information Technology 2010

2016
Aftab Ahmad

In this chapter, a novel performance model for assessing security of a layered network has been proposed. The work is motivated by the fact that there is a need for a reference framework to account for all threats to a networked system. There are few such models available, and one of them is recommended by the International Telecommunications Union (ITU). The proposed assessment model is based ...

1999
Eun Chul Kim Choong Seon Hong Joong-Goo Song

This paper proposes management architecture of multi-layer Virtual Private Network over the broadband network that will play an important role at the initial stage of broadband era. To provide flexible management capabilities with the administrator of the VPN, we adopt layering concept and abstraction mechanism to give a simple view of the real connection at service management level. The multil...

2007

Digital Rights Management (DRM) is an umbrella term for any of several arrangements which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be speci ed by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows fre...

2001
Terje Henriksen

Network interoperability may be achieved by a number of different means. This paper addresses the usage of management mechanisms to realize this goal. Where interoperability by means of management systems is concerned, standardization bodies like ITU are frequently associated with standardized network element (NE) models. This paper presents another option, interoperability on the network level...

2007

Digital Rights Management (DRM) is an umbrella term for any of several arrangements which allows a vendor of content in electronic form to control the material and restrict its usage in various ways that can be speci ed by the vendor. These arrangements are provided through security techniques, mainly encryption, and the distribution, in a detached manner, of content and rights. This allows fre...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید