{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T21:49:53Z","timestamp":1648504193579},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Bell Labs Tech. J."],"DOI":"10.1002\/bltj.20258","type":"journal-article","created":{"date-parts":[[2007,11,6]],"date-time":"2007-11-06T22:16:24Z","timestamp":1194387384000},"page":"167-185","source":"Crossref","is-referenced-by-count":0,"title":["Aspects of network security for VoIP solutions using IMS core network and Wi-Fi access"],"prefix":"10.1109","volume":"12","author":[{"given":"Ruth S.","family":"Gayde","sequence":"first","affiliation":[]},{"given":"Stinson S.","family":"Mathai","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","published-online":{"date-parts":[[2007,11,6]]},"reference":[{"key":"10.1002\/bltj.20258-BIB1|cit1","unstructured":"3rd Generation Partnership Project Internet Protocol (IP) Multimedia Call Control Protocol Based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP), Stage 3 (Release 7) Dec. 2006"},{"key":"10.1002\/bltj.20258-BIB1.2|cit2","unstructured":"http:\/\/www.3gpp.org\/ftp\/Specs\/html-info\/24229.htm"},{"key":"10.1002\/bltj.20258-BIB2|cit3","unstructured":"3rd Generation Partnership Project Technical Specification Group Services and System Aspects, 3G Security, Network Domain Security, IP Network Layer Security (Release 7) Dec. 2006"},{"key":"10.1002\/bltj.20258-BIB2.2|cit4","unstructured":"http:\/\/www.3gpp.org\/ftp\/Specs\/archive\/33_series\/33.210\/"},{"key":"10.1002\/bltj.20258-BIB3|cit5","unstructured":"3rd Generation Partnership Project 2 IMS Security Framework June 10, 2004"},{"key":"10.1002\/bltj.20258-BIB3.2|cit6","unstructured":"http:\/\/www.3gpp2.org\/Public_html\/specs\/S.R0086-A_v1.0_040614.pdf"},{"key":"10.1002\/bltj.20258-BIB4|cit7","unstructured":"3rd Generation Partnership Project 2 All-IP Core Network Multimedia Domain: IP Multimedia Subsystem-Stage 2 Nov. 2005"},{"key":"10.1002\/bltj.20258-BIB4.2|cit8","unstructured":"http:\/\/www.3gpp2.org\/Public_html\/specs\/tsgx.cfm"},{"key":"10.1002\/bltj.20258-BIB5|cit9","unstructured":"3rd Generation Partnership Project 2 Access to Operator Service and Mobility for WLAN Interworking"},{"key":"10.1002\/bltj.20258-BIB5.2|cit10","unstructured":"http:\/\/www.3gpp2.org"},{"key":"10.1002\/bltj.20258-BIB6|cit11","unstructured":"American National Standards Institute Operations, Administration, Maintenance, and Provisioning Security Requirements for the Public Telecommunications Network: A Baseline of Security Requirements for the Management Plane 2003"},{"key":"10.1002\/bltj.20258-BIB6.2|cit12","unstructured":"http:\/\/www.ansi.org"},{"key":"10.1002\/bltj.20258-BIB7|cit13","doi-asserted-by":"crossref","unstructured":"J. Arkko E. Carrara F. Lindholm M. Naslund K. Norrman MIKEY: Multimedia Internet KEYing Aug. 2004","DOI":"10.17487\/rfc3830"},{"key":"10.1002\/bltj.20258-BIB7.2|cit14","unstructured":"http:\/\/www.rfc-editor.org\/rfc\/rfc3830.txt"},{"key":"10.1002\/bltj.20258-BIB8|cit15","doi-asserted-by":"crossref","unstructured":"R. Bace P. Mell Intrusion Detection Systems Nov. 2001","DOI":"10.6028\/NIST.SP.800-31"},{"key":"10.1002\/bltj.20258-BIB8.2|cit16","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-31\/sp800-31.pdf"},{"key":"10.1002\/bltj.20258-BIB9|cit17","doi-asserted-by":"crossref","unstructured":"J. Case R. Mundy D. Partain B. Stewart Introduction and Applicability Statements for Internet Standard Management Framework Dec. 2002","DOI":"10.17487\/rfc3410"},{"key":"10.1002\/bltj.20258-BIB9.2|cit18","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc3410.txt"},{"key":"10.1002\/bltj.20258-BIB10|cit19","doi-asserted-by":"crossref","unstructured":"T. Dierks E. Rescorla The Transport Layer Security (TLS) Protocol, Version 1.1 Apr. 2006","DOI":"10.17487\/rfc4346"},{"key":"10.1002\/bltj.20258-BIB10.2|cit20","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc4346.txt"},{"key":"10.1002\/bltj.20258-BIB11|cit21","doi-asserted-by":"crossref","unstructured":"S. Frankel B. Eydt L. Owens K. Scarfone Establishing Robust Security Networks: A Guide to IEEE 802.11i Feb. 2007","DOI":"10.6028\/NIST.SP.800-97"},{"key":"10.1002\/bltj.20258-BIB11.2|cit22","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-97\/SP800-97.pdf"},{"key":"10.1002\/bltj.20258-BIB12|cit23","doi-asserted-by":"crossref","unstructured":"A. Huttunen B. Swander V. Volpe L. DiBurro M. Stenberg UDP Encapsulation of IPsec ESP Packets Jan. 2005","DOI":"10.17487\/rfc3948"},{"key":"10.1002\/bltj.20258-BIB12.2|cit24","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc3948.txt?number53948"},{"key":"10.1002\/bltj.20258-BIB13|cit25","unstructured":"International Telecommunication Union, Telecommunication Standardization Sector Information Technology-Open Systems Interconnection-Systems Management: Security Alarm Reporting Function Jan. 1992"},{"key":"10.1002\/bltj.20258-BIB13.2|cit26","unstructured":"http:\/\/www.itu.int"},{"key":"10.1002\/bltj.20258-BIB14|cit27","unstructured":"International Telecommunication Union, Telecommunication Standardization Sector Security Architecture for Systems Providing End-to-End Communications Oct. 2003"},{"key":"10.1002\/bltj.20258-BIB14.2|cit28","unstructured":"http:\/\/www.itu.int"},{"key":"10.1002\/bltj.20258-BIB15|cit29","unstructured":"International Telecommunication Union, Telecommunication Standardization Sector Security for the Management Plane: Security Requirements Apr. 2005"},{"key":"10.1002\/bltj.20258-BIB15.2|cit30","unstructured":"http:\/\/www.itu.int"},{"key":"10.1002\/bltj.20258-BIB16|cit31","unstructured":"International Telecommunication Union, Telecommunication Standardization Sector The International Public Telecommunication Numbering Plan May 2005"},{"key":"10.1002\/bltj.20258-BIB16.2|cit32","unstructured":"http:\/\/www.itu.int"},{"key":"10.1002\/bltj.20258-BIB17|cit33","unstructured":"International Telecommunication Union, Telecommunication Standardization Sector Gateway Control Protocol Sept. 2005"},{"key":"10.1002\/bltj.20258-BIB17.2|cit34","unstructured":"http:\/\/www.itu.int"},{"key":"10.1002\/bltj.20258-BIB18|cit35","unstructured":"Internet Security Systems http:\/\/www.iss.net\/"},{"key":"10.1002\/bltj.20258-BIB19|cit36","doi-asserted-by":"crossref","unstructured":"T. Karygiannis L. Owens Wireless Network Security: 802.11, Bluetooth and Handheld Devices Nov. 2002","DOI":"10.1016\/S1353-4858(02)00413-0"},{"key":"10.1002\/bltj.20258-BIB19.2|cit37","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-48\/NIST_SP_800-48.pdf"},{"key":"10.1002\/bltj.20258-BIB20|cit38","volume-title":"Internet Key Exchange (IKEv2)","year":"Dec. 2005"},{"key":"10.1002\/bltj.20258-BIB20.2|cit39","unstructured":"http:\/\/www.rfc-editor.org\/rfc\/rfc4306.txt"},{"key":"10.1002\/bltj.20258-BIB21|cit40","doi-asserted-by":"crossref","unstructured":"K. Kent M. Souppaya Guide to Computer Security Log Management Sept. 2006","DOI":"10.6028\/NIST.SP.800-92"},{"key":"10.1002\/bltj.20258-BIB21.2|cit41","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-92\/SP800-92.pdf"},{"key":"10.1002\/bltj.20258-BIB22|cit42","doi-asserted-by":"crossref","unstructured":"S. Kent K. Seo Security Architecture for the Internet Protocol Dec. 2005","DOI":"10.17487\/rfc4301"},{"key":"10.1002\/bltj.20258-BIB22.2|cit43","unstructured":"http:\/\/www.rfc-editor.org\/rfcrfc4301.txt"},{"key":"10.1002\/bltj.20258-BIB23|cit44","doi-asserted-by":"crossref","unstructured":"T. Kivinen B. Swander A. Huttunen V. Volpe Negotiation of NAT-Traversal in the IKE Jan. 2005","DOI":"10.17487\/rfc3947"},{"key":"10.1002\/bltj.20258-BIB23.2|cit45","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc3947.txt?number53947"},{"key":"10.1002\/bltj.20258-BIB24|cit46","unstructured":"National Institute of Standards and Technology NIST Security Configuration Checklists Repository"},{"key":"10.1002\/bltj.20258-BIB24.2|cit47","unstructured":"http:\/\/csrc.nist.gov\/checklists\/repository\/vendor.html"},{"key":"10.1002\/bltj.20258-BIB25|cit48","unstructured":"National Institute of Standards and Technology Role Based Access Control"},{"key":"10.1002\/bltj.20258-BIB25.2|cit49","unstructured":"http:\/\/csrc.nist.gov\/rbac\/"},{"key":"10.1002\/bltj.20258-BIB26|cit50","doi-asserted-by":"crossref","unstructured":"A. Niemi J. Arkko V. Torvinen Hypertext Transfer Protocol (HTTP) Digest Authentication Using Authentication and Key Agreement (AKA) Sept. 2002","DOI":"10.17487\/rfc3310"},{"key":"10.1002\/bltj.20258-BIB26.2|cit51","unstructured":"http:\/\/www.rfc-editor.org\/rfc\/rfc3310.txt"},{"key":"10.1002\/bltj.20258-BIB27|cit52","doi-asserted-by":"crossref","unstructured":"E. Rescorla HTTP over TLS May 2000","DOI":"10.17487\/rfc2818"},{"key":"10.1002\/bltj.20258-BIB27.2|cit53","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc2818.txt"},{"key":"10.1002\/bltj.20258-BIB28|cit54","doi-asserted-by":"crossref","unstructured":"J. Rosenberg H. Schulzrinne G. Camarillo A. Johnston J. Peterson R. Sparks M. Handley E. Schooler SIP: Session Initiation Protocol June 2002","DOI":"10.17487\/rfc3261"},{"key":"10.1002\/bltj.20258-BIB28.2|cit55","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc3261.txt"},{"key":"10.1002\/bltj.20258-BIB29|cit56","unstructured":"SANS Institute Password Policy 2006"},{"key":"10.1002\/bltj.20258-BIB29.2|cit57","unstructured":"http:\/\/www.sans.org\/resources\/policies\/Password_Policy.pdf"},{"key":"10.1002\/bltj.20258-BIB30|cit58","doi-asserted-by":"crossref","unstructured":"H. Schulzrinne S. Casner R. Frederick V. Jacobson RTP: A Transport Protocol for Real-Time Applications July 2003","DOI":"10.17487\/rfc3550"},{"key":"10.1002\/bltj.20258-BIB30.2|cit59","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc3550.txt"},{"key":"10.1002\/bltj.20258-BIB31|cit60","unstructured":"Tenable Network Security, Nessus Vulnerability Scanner http:\/\/www.nessus.org\/"},{"key":"10.1002\/bltj.20258-BIB32|cit61","unstructured":"United States Computer Emergency Readiness Team (US-CERT) http:\/\/www.us-cert.gov\/"},{"key":"10.1002\/bltj.20258-BIB33|cit62","unstructured":"United States Computer Emergency Readiness Team (US-CERT) CERT Advisory CA-1992-19 Keystroke Logging Banner"},{"key":"10.1002\/bltj.20258-BIB33.2|cit63","unstructured":"http:\/\/www.cert.org\/advisories\/CA-1992-19.html"},{"key":"10.1002\/bltj.20258-BIB34|cit64","doi-asserted-by":"crossref","unstructured":"J. Wack K. Cutler J. Pole Guidelines on Firewalls and Firewall Policies Jan. 2002","DOI":"10.6028\/NIST.SP.800-41"},{"key":"10.1002\/bltj.20258-BIB34.2|cit65","unstructured":"http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-41\/sp800-41.pdf"},{"key":"10.1002\/bltj.20258-BIB35|cit66","volume-title":"The Secure Shell (SSH) Protocol Architecture","year":"Jan. 2006"},{"key":"10.1002\/bltj.20258-BIB35.2|cit67","unstructured":"http:\/\/www.ietf.org\/rfc\/rfc4251.txt"}],"container-title":["Bell Labs Technical Journal"],"original-title":[],"language":"en","deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:55:42Z","timestamp":1602690942000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6769684"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11,6]]},"references-count":67,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1002\/bltj.20258","relation":{},"ISSN":["1089-7089"],"issn-type":[{"value":"1089-7089","type":"print"}],"subject":[],"published":{"date-parts":[[2007,11,6]]}}}