Efficiently providing secure multimedia conferencing in SEC
Security is a critical consideration for an enterprise communications system. Different work contexts and corporate cultures may have different security requirements. In fact, such requirements may range from "no security" to protection from all possible attacks. In addition, as a communic...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2483 vol.4 |
---|---|
container_issue | |
container_start_page | 2479 |
container_title | |
container_volume | 4 |
creator | Di Crescenzo, G. Hyong Sop Shim Kornievskaia, O. Patton, G. Dalal, S. |
description | Security is a critical consideration for an enterprise communications system. Different work contexts and corporate cultures may have different security requirements. In fact, such requirements may range from "no security" to protection from all possible attacks. In addition, as a communications session progresses, its context may dynamically change, and its security requirements may need to be changed accordingly. In this paper, we present our approach to providing security in enterprise communications in an efficient manner and report on the results of our initial performance study, which shows that encrypting and decrypting real-time media payloads end-to-end does not significantly degrade the quality of the end-user experience in real-time communications. Our approach is implemented in an enterprise communications system, called SEC, which is designed to enable enterprise employees to conduct secure, spontaneous, multimedia, and multi-party conferencing. |
doi_str_mv | 10.1109/ICC.2002.997289 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_997289</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>997289</ieee_id><sourcerecordid>997289</sourcerecordid><originalsourceid>FETCH-LOGICAL-i172t-6696455cc458882485f34b562915d422b68e8fc7d9188e006329ee8d206e05e63</originalsourceid><addsrcrecordid>eNotj01LAzEURQMiqLVrwVX-wIwvn_OCKwmjFgou1HWZJi8SmZmWzFTov7dS7-bCuXDgMnYnoBYC3MPK-1oCyNq5RqK7YDfQIKhGn9gVW07TN5yijQYlrtljm1IOmca5P_J92f3kmMcvPlE4FOLDoZ_zQDF3POzGRIXG8Dfnkb-3_pZdpq6faPnfC_b53H7412r99rLyT-sqi0bOlbXOamNC0AYRpUaTlN4aK50wUUu5tUiYQhOdQCQAq6QjwijBEhiyasHuz95MRJt9yUNXjpvzPfULL8RD0A</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Efficiently providing secure multimedia conferencing in SEC</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Di Crescenzo, G. ; Hyong Sop Shim ; Kornievskaia, O. ; Patton, G. ; Dalal, S.</creator><creatorcontrib>Di Crescenzo, G. ; Hyong Sop Shim ; Kornievskaia, O. ; Patton, G. ; Dalal, S.</creatorcontrib><description>Security is a critical consideration for an enterprise communications system. Different work contexts and corporate cultures may have different security requirements. In fact, such requirements may range from "no security" to protection from all possible attacks. In addition, as a communications session progresses, its context may dynamically change, and its security requirements may need to be changed accordingly. In this paper, we present our approach to providing security in enterprise communications in an efficient manner and report on the results of our initial performance study, which shows that encrypting and decrypting real-time media payloads end-to-end does not significantly degrade the quality of the end-user experience in real-time communications. Our approach is implemented in an enterprise communications system, called SEC, which is designed to enable enterprise employees to conduct secure, spontaneous, multimedia, and multi-party conferencing.</description><identifier>ISBN: 0780374002</identifier><identifier>ISBN: 9780780374003</identifier><identifier>DOI: 10.1109/ICC.2002.997289</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Communication system security ; Context ; Cryptography ; Degradation ; Information security ; Information technology ; Payloads ; Protection ; Protocols</subject><ispartof>2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333), 2002, Vol.4, p.2479-2483 vol.4</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/997289$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/997289$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Di Crescenzo, G.</creatorcontrib><creatorcontrib>Hyong Sop Shim</creatorcontrib><creatorcontrib>Kornievskaia, O.</creatorcontrib><creatorcontrib>Patton, G.</creatorcontrib><creatorcontrib>Dalal, S.</creatorcontrib><title>Efficiently providing secure multimedia conferencing in SEC</title><title>2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)</title><addtitle>ICC</addtitle><description>Security is a critical consideration for an enterprise communications system. Different work contexts and corporate cultures may have different security requirements. In fact, such requirements may range from "no security" to protection from all possible attacks. In addition, as a communications session progresses, its context may dynamically change, and its security requirements may need to be changed accordingly. In this paper, we present our approach to providing security in enterprise communications in an efficient manner and report on the results of our initial performance study, which shows that encrypting and decrypting real-time media payloads end-to-end does not significantly degrade the quality of the end-user experience in real-time communications. Our approach is implemented in an enterprise communications system, called SEC, which is designed to enable enterprise employees to conduct secure, spontaneous, multimedia, and multi-party conferencing.</description><subject>Authentication</subject><subject>Communication system security</subject><subject>Context</subject><subject>Cryptography</subject><subject>Degradation</subject><subject>Information security</subject><subject>Information technology</subject><subject>Payloads</subject><subject>Protection</subject><subject>Protocols</subject><isbn>0780374002</isbn><isbn>9780780374003</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2002</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj01LAzEURQMiqLVrwVX-wIwvn_OCKwmjFgou1HWZJi8SmZmWzFTov7dS7-bCuXDgMnYnoBYC3MPK-1oCyNq5RqK7YDfQIKhGn9gVW07TN5yijQYlrtljm1IOmca5P_J92f3kmMcvPlE4FOLDoZ_zQDF3POzGRIXG8Dfnkb-3_pZdpq6faPnfC_b53H7412r99rLyT-sqi0bOlbXOamNC0AYRpUaTlN4aK50wUUu5tUiYQhOdQCQAq6QjwijBEhiyasHuz95MRJt9yUNXjpvzPfULL8RD0A</recordid><startdate>2002</startdate><enddate>2002</enddate><creator>Di Crescenzo, G.</creator><creator>Hyong Sop Shim</creator><creator>Kornievskaia, O.</creator><creator>Patton, G.</creator><creator>Dalal, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>2002</creationdate><title>Efficiently providing secure multimedia conferencing in SEC</title><author>Di Crescenzo, G. ; Hyong Sop Shim ; Kornievskaia, O. ; Patton, G. ; Dalal, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i172t-6696455cc458882485f34b562915d422b68e8fc7d9188e006329ee8d206e05e63</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2002</creationdate><topic>Authentication</topic><topic>Communication system security</topic><topic>Context</topic><topic>Cryptography</topic><topic>Degradation</topic><topic>Information security</topic><topic>Information technology</topic><topic>Payloads</topic><topic>Protection</topic><topic>Protocols</topic><toplevel>online_resources</toplevel><creatorcontrib>Di Crescenzo, G.</creatorcontrib><creatorcontrib>Hyong Sop Shim</creatorcontrib><creatorcontrib>Kornievskaia, O.</creatorcontrib><creatorcontrib>Patton, G.</creatorcontrib><creatorcontrib>Dalal, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Di Crescenzo, G.</au><au>Hyong Sop Shim</au><au>Kornievskaia, O.</au><au>Patton, G.</au><au>Dalal, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Efficiently providing secure multimedia conferencing in SEC</atitle><btitle>2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)</btitle><stitle>ICC</stitle><date>2002</date><risdate>2002</risdate><volume>4</volume><spage>2479</spage><epage>2483 vol.4</epage><pages>2479-2483 vol.4</pages><isbn>0780374002</isbn><isbn>9780780374003</isbn><abstract>Security is a critical consideration for an enterprise communications system. Different work contexts and corporate cultures may have different security requirements. In fact, such requirements may range from "no security" to protection from all possible attacks. In addition, as a communications session progresses, its context may dynamically change, and its security requirements may need to be changed accordingly. In this paper, we present our approach to providing security in enterprise communications in an efficient manner and report on the results of our initial performance study, which shows that encrypting and decrypting real-time media payloads end-to-end does not significantly degrade the quality of the end-user experience in real-time communications. Our approach is implemented in an enterprise communications system, called SEC, which is designed to enable enterprise employees to conduct secure, spontaneous, multimedia, and multi-party conferencing.</abstract><pub>IEEE</pub><doi>10.1109/ICC.2002.997289</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0780374002 |
ispartof | 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333), 2002, Vol.4, p.2479-2483 vol.4 |
issn | |
language | eng |
recordid | cdi_ieee_primary_997289 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Communication system security Context Cryptography Degradation Information security Information technology Payloads Protection Protocols |
title | Efficiently providing secure multimedia conferencing in SEC |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T08%3A01%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Efficiently%20providing%20secure%20multimedia%20conferencing%20in%20SEC&rft.btitle=2002%20IEEE%20International%20Conference%20on%20Communications.%20Conference%20Proceedings.%20ICC%202002%20(Cat.%20No.02CH37333)&rft.au=Di%20Crescenzo,%20G.&rft.date=2002&rft.volume=4&rft.spage=2479&rft.epage=2483%20vol.4&rft.pages=2479-2483%20vol.4&rft.isbn=0780374002&rft.isbn_list=9780780374003&rft_id=info:doi/10.1109/ICC.2002.997289&rft_dat=%3Cieee_6IE%3E997289%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=997289&rfr_iscdi=true |