Profiling the Protection of Sensitive Enterprise Multimedia Communication

R. Falk, S. Fries
{"title":"Profiling the Protection of Sensitive Enterprise Multimedia Communication","authors":"R. Falk, S. Fries","doi":"10.1109/ICIW.2009.41","DOIUrl":null,"url":null,"abstract":"Voice is, besides email, the major personal communication technology used by employees of an enterprise. Additionally, multimedia communication is getting used more and more in the form of video conferences to decrease travel cost and support environmental protection. Besides oral communication also documents, e.g. presentations, may be shared. Thus sensitive information is likely to be exchanged as part of the communication. Hence, an appropriate security level is of great relevance to protect enterprise’s confidential information. Historically, security measures for communication systems have either been targeted to prevent fraud, thereby securing the operator’s business model, or to provide military-class end-to-end encryption. Neither approach targets the security objectives of enterprises using private and public communication infrastructure for sensitive business exchanges. It is common practice within enterprises to define different data protection classes and associated rules that have to be respected when dealing with sensitive information. Thus, the main contribution here is on one hand an evaluation of relevant available or known security technology from the perspective of protecting sensitive enterprise communication, and a roadmap for an incremental, step-wise introduction of security features in multimedia (including voice and video) communication that allows for a step-wise (incremental) introduction of security features required for different security levels.","PeriodicalId":390934,"journal":{"name":"2009 Fourth International Conference on Internet and Web Applications and Services","volume":"285 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Internet and Web Applications and Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIW.2009.41","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Voice is, besides email, the major personal communication technology used by employees of an enterprise. Additionally, multimedia communication is getting used more and more in the form of video conferences to decrease travel cost and support environmental protection. Besides oral communication also documents, e.g. presentations, may be shared. Thus sensitive information is likely to be exchanged as part of the communication. Hence, an appropriate security level is of great relevance to protect enterprise’s confidential information. Historically, security measures for communication systems have either been targeted to prevent fraud, thereby securing the operator’s business model, or to provide military-class end-to-end encryption. Neither approach targets the security objectives of enterprises using private and public communication infrastructure for sensitive business exchanges. It is common practice within enterprises to define different data protection classes and associated rules that have to be respected when dealing with sensitive information. Thus, the main contribution here is on one hand an evaluation of relevant available or known security technology from the perspective of protecting sensitive enterprise communication, and a roadmap for an incremental, step-wise introduction of security features in multimedia (including voice and video) communication that allows for a step-wise (incremental) introduction of security features required for different security levels.
浅谈企业敏感多媒体通信的保护
语音是企业员工除电子邮件外使用的主要个人通信技术。此外,多媒体通信越来越多地以视频会议的形式使用,以减少差旅成本和支持环境保护。除了口头交流之外,也可以共享文件,例如演示文稿。因此,作为通信的一部分,可能会交换敏感信息。因此,适当的安全级别对于保护企业的机密信息至关重要。从历史上看,通信系统的安全措施要么是为了防止欺诈,从而保护运营商的商业模式,要么是为了提供军用级的端到端加密。这两种方法都无法针对使用私有和公共通信基础设施进行敏感业务交换的企业的安全目标。在企业中,定义不同的数据保护类和在处理敏感信息时必须遵守的相关规则是常见的做法。因此,本文的主要贡献一方面是从保护敏感企业通信的角度对相关可用的或已知的安全技术进行了评估,并给出了在多媒体(包括语音和视频)通信中逐步引入安全特性的路线图,该路线图允许逐步(增量)引入不同安全级别所需的安全特性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信