{"title":"安全SIP架构中安全策略的系统集成","authors":"Toshima Singh Rajput, Maheshwar Kamini, Taruna Jain","doi":"10.1109/SCEECS.2018.8546849","DOIUrl":null,"url":null,"abstract":"VoIP services has revolutionized the traditional approach of communication in the electronics industry. The services offer an integrated approach to real time communication using the components of voice, video and chat transmission in a secured environment. The research paper integrates the algorithmic approach in outlining the Transmission of voice, video in a secured architecture using Python. As Python programming language provides a platform for the attackers to implement techniques of extracting information, thus it can also provide an environment of secured architecture because of its implementation of libraries to interact with the kernel. This paper also outlines the security policies for a firewall implementation to allow or deny traffic and to prevent security threats through a python script.","PeriodicalId":446667,"journal":{"name":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Systematic integration of Security Policies for a Secured SIP Architecture\",\"authors\":\"Toshima Singh Rajput, Maheshwar Kamini, Taruna Jain\",\"doi\":\"10.1109/SCEECS.2018.8546849\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"VoIP services has revolutionized the traditional approach of communication in the electronics industry. The services offer an integrated approach to real time communication using the components of voice, video and chat transmission in a secured environment. The research paper integrates the algorithmic approach in outlining the Transmission of voice, video in a secured architecture using Python. As Python programming language provides a platform for the attackers to implement techniques of extracting information, thus it can also provide an environment of secured architecture because of its implementation of libraries to interact with the kernel. This paper also outlines the security policies for a firewall implementation to allow or deny traffic and to prevent security threats through a python script.\",\"PeriodicalId\":446667,\"journal\":{\"name\":\"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SCEECS.2018.8546849\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SCEECS.2018.8546849","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Systematic integration of Security Policies for a Secured SIP Architecture
VoIP services has revolutionized the traditional approach of communication in the electronics industry. The services offer an integrated approach to real time communication using the components of voice, video and chat transmission in a secured environment. The research paper integrates the algorithmic approach in outlining the Transmission of voice, video in a secured architecture using Python. As Python programming language provides a platform for the attackers to implement techniques of extracting information, thus it can also provide an environment of secured architecture because of its implementation of libraries to interact with the kernel. This paper also outlines the security policies for a firewall implementation to allow or deny traffic and to prevent security threats through a python script.