{"title":"联邦电信中电话详细记录数据的保护","authors":"Santosh Chokhani","doi":"10.1109/CSAC.1989.81030","DOIUrl":null,"url":null,"abstract":"Techniques for protection of the call detail records (CDR) in US federal government telecommunications systems, such as the FTS2000 and agency PABXs, are identified. CDR data flow, its use in telecommunication, and its protection requirements are described. Descriptions of threats and countermeasures are provided. Recommendations for handling and protection of the CDR database are made for the following organizations: FTS2000 contractor billing, FTS2000 contractor network engineering, Service Oversight Center, and user agencies.<<ETX>>","PeriodicalId":284420,"journal":{"name":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","volume":"229 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Protection of call detail records data in federal telecommunications\",\"authors\":\"Santosh Chokhani\",\"doi\":\"10.1109/CSAC.1989.81030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Techniques for protection of the call detail records (CDR) in US federal government telecommunications systems, such as the FTS2000 and agency PABXs, are identified. CDR data flow, its use in telecommunication, and its protection requirements are described. Descriptions of threats and countermeasures are provided. Recommendations for handling and protection of the CDR database are made for the following organizations: FTS2000 contractor billing, FTS2000 contractor network engineering, Service Oversight Center, and user agencies.<<ETX>>\",\"PeriodicalId\":284420,\"journal\":{\"name\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"volume\":\"229 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1989-12-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1989 Proceedings] Fifth Annual Computer Security Applications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1989.81030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1989 Proceedings] Fifth Annual Computer Security Applications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1989.81030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protection of call detail records data in federal telecommunications
Techniques for protection of the call detail records (CDR) in US federal government telecommunications systems, such as the FTS2000 and agency PABXs, are identified. CDR data flow, its use in telecommunication, and its protection requirements are described. Descriptions of threats and countermeasures are provided. Recommendations for handling and protection of the CDR database are made for the following organizations: FTS2000 contractor billing, FTS2000 contractor network engineering, Service Oversight Center, and user agencies.<>