期刊文献+

Internet网络上合法侦听模型的研究 被引量:2

A study of legitimately intercepts model in the Internet
下载PDF
导出
摘要 本文根据ETSI标准,从合法侦听的角度分析了网络数据传输模型,给出了该传输模型下侦听点的设置规则。根据网络联接方式和侦听点设置的不同,设计出了相应的合法侦听模型。 This article according to the ETSI standard, from the point of legitimately intercepts has analyzed the network data trans- mission model, provided intercepts settings rule based on the different transmission model. According to the difference of network joint way and intercepts setting, designed corresponding model of legitimately intercepts.
机构地区 石家庄经济学院
出处 《微计算机信息》 北大核心 2006年第09X期122-124,共3页 Control & Automation
关键词 合法侦听 侦听模型 安全隧道 lawful intercept,intercept model.,IP Sec
  • 相关文献

参考文献8

  • 1Telecommunications security; Lawful Interception (LI); Handover Interface for the lawful interception of telecommunications traffic,ETSI ES 201 671 [S]. 被引量:1
  • 2Telecommunications security; Lawful Interception (LI);Requirements for network functions, ETSI ES 201 158 V1.2.1 (2002-04) IS]. 被引量:1
  • 3Telecommunications security; Lawful Interception (LI);Requirements of Law Enforcement Agencies ,ETSI TS 101 331 V1.1.1(2001-08) [S]. 被引量:1
  • 4Telecommunications security; Lawful Interception (LI);Description of GPRS HI3,ETSI TR 101 876 V1.1.1 (2001-01) [S]. 被引量:1
  • 5Telecommunications security; Lawful Interception (LI);Issues on IP Interception ETSI TR 101 944 V1.1.2 (2001-12) [S]. 被引量:1
  • 6P. Branch, Centre for Advanced Internet Architectures Swinburne University of Technology Hawthorn. 07,2003. Lawful Interception of IP Traffic [DB/OL], http://atnac2003.atcrc.com/ORALS/branch.pdf. 被引量:1
  • 7Transport of Intercepted IP Traffic (TⅡT) Version 1.0.0. 09,19,2002 [S]. 被引量:1
  • 8祁昶,黄天戍.基于Internet的测控网络设计[J].微计算机信息,2005,21(3):10-11. 被引量:1

二级参考文献1

  • 1Echelon Corporation Neuron Chip engineering bulletin, NewYork:Echelon Corp. Pub.1999. 被引量:1

同被引文献6

  • 1叶志辉,孟旭东,刘明明.软交换网络合法侦听的研究[J].南京邮电学院学报(自然科学版),2005,25(2):40-43. 被引量:3
  • 2ETSI TR 101 943 vl.l.l. Tclccommunications security; Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture[S]. 2001.07. 被引量:1
  • 3ETSI ES 201 158 vl.2.1. Telecommunications security; Lawful Interception (LI) ; Requirements for network functions[S]. 2002.04. 被引量:1
  • 4ETSI ES 201 158 v1. 2.1. Telecommunications security: Lawful Interception (LI). Requirements for network functions [ S]. 2002. 被引量:1
  • 5ETSI TR 101 943 v1. 1.1. Telecommunications security; Lawful Interception (LI). Concepts of Interception in a Generic Network Architecture [ S]. 2001. 被引量:1
  • 6杨国民,孟旭东.IP合法侦听技术[J].江苏通信,2004,0(6):22-24. 被引量:3

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部