It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

Security Patterns for Voice over IP Networks | Fernandez | Journal of Software
Journal of Software, Vol 2, No 2 (2007), 19-29, Aug 2007
doi:10.4304/jsw.2.2.19-29

Security Patterns for Voice over IP Networks

Eduardo B. Fernandez, Juan C. Pelaez, Maria M. Larrondo-Petrie

Abstract


Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditional data packets. The convergence of voice and data in the same network brings both benefits and constraints to users. Among the several issues that need to be addressed when deploying this technology, security is one of the most critical. We give an overview of VoIP and provide UML models of some aspects of its infrastructure, including architectures and basic use cases. We present some security patterns that describe mechanisms that can control many of the possible attacks and which could be used to design secure systems.



Keywords


security patterns, Voice over IP, network architecture, software architecture

References



Full Text: PDF


Journal of Software (JSW, ISSN 1796-217X)

Copyright @ 2006-2014 by ACADEMY PUBLISHER – All rights reserved.