Serveur d'exploration sur la recherche en informatique en Lorraine

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Managing Risks at Runtime in VoIP Networks and Services

Identifieur interne : 001D73 ( Istex/Corpus ); précédent : 001D72; suivant : 001D74

Managing Risks at Runtime in VoIP Networks and Services

Auteurs : Oussema Dabbebi ; Remi Badonnel ; Olivier Festor

Source :

RBID : ISTEX:7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB

Abstract

Abstract: IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and automate risk management methods and techniques for VoIP infrastructures. Our objective is to dynamically adapt the exposure of a VoIP network with regard to the attack potentiality while minimizing the impact for the service. This paper describes the challenges of risk management for VoIP, our runtime strategy for assessing and treating risks, preliminary results based on Monte-Carlo simulations and future work.

Url:
DOI: 10.1007/978-3-642-13986-4_11

Links to Exploration step

ISTEX:7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Managing Risks at Runtime in VoIP Networks and Services</title>
<author>
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
<affiliation>
<mods:affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
<affiliation>
<mods:affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
<affiliation>
<mods:affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-13986-4_11</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-0GX759BP-8/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001D73</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001D73</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Managing Risks at Runtime in VoIP Networks and Services</title>
<author>
<name sortKey="Dabbebi, Oussema" sort="Dabbebi, Oussema" uniqKey="Dabbebi O" first="Oussema" last="Dabbebi">Oussema Dabbebi</name>
<affiliation>
<mods:affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Badonnel, Remi" sort="Badonnel, Remi" uniqKey="Badonnel R" first="Remi" last="Badonnel">Remi Badonnel</name>
<affiliation>
<mods:affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Festor, Olivier" sort="Festor, Olivier" uniqKey="Festor O" first="Olivier" last="Festor">Olivier Festor</name>
<affiliation>
<mods:affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and automate risk management methods and techniques for VoIP infrastructures. Our objective is to dynamically adapt the exposure of a VoIP network with regard to the attack potentiality while minimizing the impact for the service. This paper describes the challenges of risk management for VoIP, our runtime strategy for assessing and treating risks, preliminary results based on Monte-Carlo simulations and future work.</div>
</front>
</TEI>
<istex>
<corpusName>springer-ebooks</corpusName>
<author>
<json:item>
<name>Oussema Dabbebi</name>
<affiliations>
<json:string>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Remi Badonnel</name>
<affiliations>
<json:string>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</json:string>
</affiliations>
</json:item>
<json:item>
<name>Olivier Festor</name>
<affiliations>
<json:string>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</json:string>
</affiliations>
</json:item>
</author>
<arkIstex>ark:/67375/HCB-0GX759BP-8</arkIstex>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and automate risk management methods and techniques for VoIP infrastructures. Our objective is to dynamically adapt the exposure of a VoIP network with regard to the attack potentiality while minimizing the impact for the service. This paper describes the challenges of risk management for VoIP, our runtime strategy for assessing and treating risks, preliminary results based on Monte-Carlo simulations and future work.</abstract>
<qualityIndicators>
<score>4.929</score>
<pdfWordCount>1417</pdfWordCount>
<pdfCharCount>8968</pdfCharCount>
<pdfVersion>1.6</pdfVersion>
<pdfPageCount>4</pdfPageCount>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<abstractWordCount>126</abstractWordCount>
<abstractCharCount>820</abstractCharCount>
<keywordCount>0</keywordCount>
</qualityIndicators>
<title>Managing Risks at Runtime in VoIP Networks and Services</title>
<chapterId>
<json:string>11</json:string>
<json:string>Chap11</json:string>
</chapterId>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<title>Lecture Notes in Computer Science</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2010</copyrightDate>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, Lancaster, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, Stanford, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>University of California, Los Angeles, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Doug Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbrücken, Germany</json:string>
</affiliations>
</json:item>
</editor>
</serie>
<host>
<title>Mechanisms for Autonomous Management of Networks and Services</title>
<language>
<json:string>unknown</json:string>
</language>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-13986-4</json:string>
</doi>
<issn>
<json:string>0302-9743</json:string>
</issn>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<eisbn>
<json:string>978-3-642-13986-4</json:string>
</eisbn>
<bookId>
<json:string>978-3-642-13986-4</json:string>
</bookId>
<isbn>
<json:string>978-3-642-13985-7</json:string>
</isbn>
<volume>6155</volume>
<pages>
<first>89</first>
<last>92</last>
</pages>
<genre>
<json:string>book-series</json:string>
</genre>
<editor>
<json:item>
<name>Burkhard Stiller</name>
<affiliations>
<json:string>UZH, Communication Systems Group, CSG, Department of Informatics, IFI, University of Zurich, Binzmühlestrasse 14, 8050, Zurich, Switzerland</json:string>
<json:string>E-mail: stiller@ifi.uzh.ch</json:string>
</affiliations>
</json:item>
<json:item>
<name>Filip De Turck</name>
<affiliations>
<json:string>IBBT, Department of Information Technology, Ghent University, Gaston Crommenlaan 8, 9050, Gent, Belgium</json:string>
<json:string>E-mail: filip.deturck@intec.ugent.be</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>Algorithm Analysis and Problem Complexity</value>
</json:item>
<json:item>
<value>Operating Systems</value>
</json:item>
<json:item>
<value>Programming Techniques</value>
</json:item>
</subject>
</host>
<ark>
<json:string>ark:/67375/HCB-0GX759BP-8</json:string>
</ark>
<publicationDate>2010</publicationDate>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-13986-4_11</json:string>
</doi>
<id>7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB</id>
<score>1</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-0GX759BP-8/fulltext.pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-0GX759BP-8/bundle.zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/ark:/67375/HCB-0GX759BP-8/fulltext.tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Managing Risks at Runtime in VoIP Networks and Services</title>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<availability>
<licence>Springer-Verlag Berlin Heidelberg</licence>
</availability>
<date when="2010">2010</date>
</publicationStmt>
<notesStmt>
<note type="conference" source="proceedings" scheme="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</note>
<note type="publication-type" subtype="book-series" scheme="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</note>
</notesStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Managing Risks at Runtime in VoIP Networks and Services</title>
<author>
<persName>
<forename type="first">Oussema</forename>
<surname>Dabbebi</surname>
</persName>
<affiliation>
<orgName type="department">INRIA Nancy Grand Est - LORIA</orgName>
<orgName type="institution">Technopôle de Nancy Brabois</orgName>
<address>
<postBox>Campus Scientifique - BP 239</postBox>
<postCode>54506</postCode>
<settlement>Vandœuvre-lès-Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Remi</forename>
<surname>Badonnel</surname>
</persName>
<affiliation>
<orgName type="department">INRIA Nancy Grand Est - LORIA</orgName>
<orgName type="institution">Technopôle de Nancy Brabois</orgName>
<address>
<postBox>Campus Scientifique - BP 239</postBox>
<postCode>54506</postCode>
<settlement>Vandœuvre-lès-Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<author>
<persName>
<forename type="first">Olivier</forename>
<surname>Festor</surname>
</persName>
<affiliation>
<orgName type="department">INRIA Nancy Grand Est - LORIA</orgName>
<orgName type="institution">Technopôle de Nancy Brabois</orgName>
<address>
<postBox>Campus Scientifique - BP 239</postBox>
<postCode>54506</postCode>
<settlement>Vandœuvre-lès-Nancy</settlement>
<country key="FR">FRANCE</country>
</address>
</affiliation>
</author>
<idno type="istex">7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB</idno>
<idno type="ark">ark:/67375/HCB-0GX759BP-8</idno>
<idno type="DOI">10.1007/978-3-642-13986-4_11</idno>
</analytic>
<monogr>
<title level="m" type="main">Mechanisms for Autonomous Management of Networks and Services</title>
<title level="m" type="sub">4th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2010, Zurich, Switzerland, June 23-25, 2010. Proceedings</title>
<title level="m" type="part">PhD Workshop: Overlays and Non-conventional Network Infrastructures</title>
<idno type="DOI">10.1007/978-3-642-13986-4</idno>
<idno type="book-id">978-3-642-13986-4</idno>
<idno type="ISBN">978-3-642-13985-7</idno>
<idno type="eISBN">978-3-642-13986-4</idno>
<idno type="chapter-id">Chap11</idno>
<idno type="part-id">Part4</idno>
<editor>
<persName>
<forename type="first">Burkhard</forename>
<surname>Stiller</surname>
</persName>
<email>stiller@ifi.uzh.ch</email>
<affiliation>
<orgName type="department">UZH, Communication Systems Group, CSG, Department of Informatics, IFI</orgName>
<orgName type="institution">University of Zurich</orgName>
<address>
<street>Binzmühlestrasse 14</street>
<postCode>8050</postCode>
<settlement>Zurich</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Filip</forename>
<nameLink>De</nameLink>
<surname>Turck</surname>
</persName>
<email>filip.deturck@intec.ugent.be</email>
<affiliation>
<orgName type="department">IBBT, Department of Information Technology</orgName>
<orgName type="institution">Ghent University</orgName>
<address>
<street>Gaston Crommenlaan 8</street>
<postCode>9050</postCode>
<settlement>Gent</settlement>
<country key="BE">BELGIUM</country>
</address>
</affiliation>
</editor>
<imprint>
<biblScope unit="vol">6155</biblScope>
<biblScope unit="page" from="89">89</biblScope>
<biblScope unit="page" to="92">92</biblScope>
<biblScope unit="chapter-count">26</biblScope>
<biblScope unit="part-chapter-count">6</biblScope>
</imprint>
</monogr>
<series>
<title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>
<orgName type="institution">Lancaster University</orgName>
<address>
<settlement>Lancaster</settlement>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>
<orgName type="institution">Carnegie Mellon University</orgName>
<address>
<settlement>Pittsburgh</settlement>
<region>PA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>
<orgName type="institution">University of Surrey</orgName>
<address>
<settlement>Guildford</settlement>
<country key="GB">UNITED KINGDOM</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>
<orgName type="institution">Cornell University</orgName>
<address>
<settlement>Ithaca</settlement>
<region>NY</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>
<orgName type="institution">ETH Zurich</orgName>
<address>
<settlement>Zurich</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>
<orgName type="institution">Stanford University</orgName>
<address>
<settlement>Stanford</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>
<orgName type="institution">Weizmann Institute of Science</orgName>
<address>
<settlement>Rehovot</settlement>
<country key="IL">ISRAEL</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>
<orgName type="institution">University of Bern</orgName>
<address>
<settlement>Bern</settlement>
<country key="CH">SWITZERLAND</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>
<orgName type="institution">Indian Institute of Technology</orgName>
<address>
<settlement>Madras</settlement>
<country key="IN">INDIA</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>
<orgName type="institution">University of Dortmund</orgName>
<address>
<settlement>Dortmund</settlement>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>
<orgName type="institution">Massachusetts Institute of Technology</orgName>
<address>
<region>MA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>
<orgName type="institution">University of California</orgName>
<address>
<settlement>Los Angeles</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
<affiliation>
<orgName type="institution">University of California</orgName>
<address>
<settlement>Berkeley</settlement>
<region>CA</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>
<orgName type="institution">Rice University</orgName>
<address>
<settlement>Houston</settlement>
<region>TX</region>
<country key="US">UNITED STATES</country>
</address>
</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>
<orgName type="institution">Max-Planck Institute of Computer Science</orgName>
<address>
<settlement>Saarbrücken</settlement>
<country key="DE">GERMANY</country>
</address>
</affiliation>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesID">558</idno>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<abstract xml:lang="en">
<head>Abstract</head>
<p>IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and automate risk management methods and techniques for VoIP infrastructures. Our objective is to dynamically adapt the exposure of a VoIP network with regard to the attack potentiality while minimizing the impact for the service. This paper describes the challenges of risk management for VoIP, our runtime strategy for assessing and treating risks, preliminary results based on Monte-Carlo simulations and future work.</p>
</abstract>
<textClass ana="subject">
<keywords scheme="book-subject-collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass ana="subject">
<keywords scheme="book-subject">
<list>
<label>I</label>
<item>
<term type="Primary">Computer Science</term>
</item>
<label>I13022</label>
<item>
<term type="Secondary" subtype="priority-1">Computer Communication Networks</term>
</item>
<label>I14029</label>
<item>
<term type="Secondary" subtype="priority-2">Software Engineering</term>
</item>
<label>I18040</label>
<item>
<term type="Secondary" subtype="priority-3">Information Systems Applications (incl.Internet)</term>
</item>
<label>I16021</label>
<item>
<term type="Secondary" subtype="priority-4">Algorithm Analysis and Problem Complexity</term>
</item>
<label>I14045</label>
<item>
<term type="Secondary" subtype="priority-5">Operating Systems</term>
</item>
<label>I14010</label>
<item>
<term type="Secondary" subtype="priority-6">Programming Techniques</term>
</item>
</list>
</keywords>
</textClass>
<langUsage>
<language ident="EN"></language>
</langUsage>
</profileDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-0GX759BP-8/fulltext.txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="corpus springer-ebooks not found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<City>Lancaster</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>Stanford</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<City>Bern</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<City>Dortmund</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<State>MA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Los Angeles</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-642-13986-4</BookID>
<BookTitle>Mechanisms for Autonomous Management of Networks and Services</BookTitle>
<BookSubTitle>4th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2010, Zurich, Switzerland, June 23-25, 2010. Proceedings</BookSubTitle>
<BookVolumeNumber>6155</BookVolumeNumber>
<BookSequenceNumber>6155</BookSequenceNumber>
<BookDOI>10.1007/978-3-642-13986-4</BookDOI>
<BookTitleID>212041</BookTitleID>
<BookPrintISBN>978-3-642-13985-7</BookPrintISBN>
<BookElectronicISBN>978-3-642-13986-4</BookElectronicISBN>
<BookChapterCount>26</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>IFIP International Federation for Information Processing</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I13022" Priority="1" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I14029" Priority="2" Type="Secondary">Software Engineering</BookSubject>
<BookSubject Code="I18040" Priority="3" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Code="I16021" Priority="4" Type="Secondary">Algorithm Analysis and Problem Complexity</BookSubject>
<BookSubject Code="I14045" Priority="5" Type="Secondary">Operating Systems</BookSubject>
<BookSubject Code="I14010" Priority="6" Type="Secondary">Programming Techniques</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Burkhard</GivenName>
<FamilyName>Stiller</FamilyName>
</EditorName>
<Contact>
<Email>stiller@ifi.uzh.ch</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Filip</GivenName>
<Particle>De</Particle>
<FamilyName>Turck</FamilyName>
</EditorName>
<Contact>
<Email>filip.deturck@intec.ugent.be</Email>
</Contact>
</Editor>
<Affiliation ID="Aff16">
<OrgDivision>UZH, Communication Systems Group, CSG, Department of Informatics, IFI</OrgDivision>
<OrgName>University of Zurich</OrgName>
<OrgAddress>
<Street>Binzmühlestrasse 14</Street>
<Postcode>8050</Postcode>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgDivision>IBBT, Department of Information Technology</OrgDivision>
<OrgName>Ghent University</OrgName>
<OrgAddress>
<Street>Gaston Crommenlaan 8</Street>
<Postcode>9050</Postcode>
<City>Gent</City>
<Country>Belgium</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part4">
<PartInfo TocLevels="0">
<PartID>4</PartID>
<PartSequenceNumber>4</PartSequenceNumber>
<PartTitle>PhD Workshop: Overlays and Non-conventional Network Infrastructures</PartTitle>
<PartChapterCount>6</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Mechanisms for Autonomous Management of Networks and Services</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap11" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>11</ChapterID>
<ChapterDOI>10.1007/978-3-642-13986-4_11</ChapterDOI>
<ChapterSequenceNumber>11</ChapterSequenceNumber>
<ChapterTitle Language="En">Managing Risks at Runtime in VoIP Networks and Services</ChapterTitle>
<ChapterFirstPage>89</ChapterFirstPage>
<ChapterLastPage>92</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>4</PartID>
<BookID>978-3-642-13986-4</BookID>
<BookTitle>Mechanisms for Autonomous Management of Networks and Services</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Oussema</GivenName>
<FamilyName>Dabbebi</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Remi</GivenName>
<FamilyName>Badonnel</FamilyName>
</AuthorName>
</Author>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Olivier</GivenName>
<FamilyName>Festor</FamilyName>
</AuthorName>
</Author>
<Affiliation ID="Aff18">
<OrgDivision>INRIA Nancy Grand Est - LORIA</OrgDivision>
<OrgName>Technopôle de Nancy Brabois</OrgName>
<OrgAddress>
<Postbox>Campus Scientifique - BP 239</Postbox>
<Postcode>54506</Postcode>
<City>Vandœuvre-lès-Nancy</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and automate risk management methods and techniques for VoIP infrastructures. Our objective is to dynamically adapt the exposure of a VoIP network with regard to the attack potentiality while minimizing the impact for the service. This paper describes the challenges of risk management for VoIP, our runtime strategy for assessing and treating risks, preliminary results based on Monte-Carlo simulations and future work.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Managing Risks at Runtime in VoIP Networks and Services</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA">
<title>Managing Risks at Runtime in VoIP Networks and Services</title>
</titleInfo>
<name type="personal">
<namePart type="given">Oussema</namePart>
<namePart type="family">Dabbebi</namePart>
<affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Remi</namePart>
<namePart type="family">Badonnel</namePart>
<affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Olivier</namePart>
<namePart type="family">Festor</namePart>
<affiliation>INRIA Nancy Grand Est - LORIA, Technopôle de Nancy Brabois, Campus Scientifique - BP 239, 54506, Vandœuvre-lès-Nancy, France</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre displayLabel="OriginalPaper" authority="ISTEX" authorityURI="https://content-type.data.istex.fr" type="conference" valueURI="https://content-type.data.istex.fr/ark:/67375/XTP-BFHXPBJJ-3">conference</genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2010</dateIssued>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<abstract lang="en">Abstract: IP telephony is less confined than traditional PSTN telephony. As a consequence, it is more exposed to security attacks. These attacks are specific to VoIP protocols such as SPIT, or are inherited from the IP layer such as ARP poisoning. Protection mechanisms are often available, but they may seriously impact on the quality of service of such critical environments. We propose to exploit and automate risk management methods and techniques for VoIP infrastructures. Our objective is to dynamically adapt the exposure of a VoIP network with regard to the attack potentiality while minimizing the impact for the service. This paper describes the challenges of risk management for VoIP, our runtime strategy for assessing and treating risks, preliminary results based on Monte-Carlo simulations and future work.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Mechanisms for Autonomous Management of Networks and Services</title>
<subTitle>4th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2010, Zurich, Switzerland, June 23-25, 2010. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Burkhard</namePart>
<namePart type="family">Stiller</namePart>
<affiliation>UZH, Communication Systems Group, CSG, Department of Informatics, IFI, University of Zurich, Binzmühlestrasse 14, 8050, Zurich, Switzerland</affiliation>
<affiliation>E-mail: stiller@ifi.uzh.ch</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Filip</namePart>
<namePart type="family">De Turck</namePart>
<affiliation>IBBT, Department of Information Technology, Ghent University, Gaston Crommenlaan 8, 9050, Gent, Belgium</affiliation>
<affiliation>E-mail: filip.deturck@intec.ugent.be</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" authority="ISTEX" authorityURI="https://publication-type.data.istex.fr" valueURI="https://publication-type.data.istex.fr/ark:/67375/JMC-0G6R5W5T-Z">book-series</genre>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16021">Algorithm Analysis and Problem Complexity</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14045">Operating Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14010">Programming Techniques</topic>
</subject>
<identifier type="DOI">10.1007/978-3-642-13986-4</identifier>
<identifier type="ISBN">978-3-642-13985-7</identifier>
<identifier type="eISBN">978-3-642-13986-4</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">212041</identifier>
<identifier type="BookID">978-3-642-13986-4</identifier>
<identifier type="BookChapterCount">26</identifier>
<identifier type="BookVolumeNumber">6155</identifier>
<identifier type="BookSequenceNumber">6155</identifier>
<identifier type="PartChapterCount">6</identifier>
<part>
<date>2010</date>
<detail type="part">
<title>PhD Workshop: Overlays and Non-conventional Network Infrastructures</title>
</detail>
<detail type="volume">
<number>6155</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>89</start>
<end>92</end>
</extent>
</part>
<recordInfo>
<recordOrigin>IFIP International Federation for Information Processing, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<publisher>Springer</publisher>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>IFIP International Federation for Information Processing, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB</identifier>
<identifier type="ark">ark:/67375/HCB-0GX759BP-8</identifier>
<identifier type="DOI">10.1007/978-3-642-13986-4_11</identifier>
<identifier type="ChapterID">11</identifier>
<identifier type="ChapterID">Chap11</identifier>
<accessCondition type="use and reproduction" contentType="copyright">IFIP International Federation for Information Processing, 2010</accessCondition>
<recordInfo>
<recordContentSource authority="ISTEX" authorityURI="https://loaded-corpus.data.istex.fr" valueURI="https://loaded-corpus.data.istex.fr/ark:/67375/XBH-RLRX46XW-4">springer</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</mods>
<json:item>
<extension>json</extension>
<original>false</original>
<mimetype>application/json</mimetype>
<uri>https://api.istex.fr/ark:/67375/HCB-0GX759BP-8/record.json</uri>
</json:item>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001D73 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 001D73 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Lorraine
   |area=    InforLorV4
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:7FEED8BD47C0CD4207AF7244B8D4491CC543F5FB
   |texte=   Managing Risks at Runtime in VoIP Networks and Services
}}

Wicri

This area was generated with Dilib version V0.6.33.
Data generation: Mon Jun 10 21:56:28 2019. Site generation: Fri Feb 25 15:29:27 2022