Attributes | Values |
---|
rdf:type
| |
Description
| - The aim of this paper is to enumerate major issues in designing a lawful interception system for IPv6 networks. Today, network and content providers are required to cooperate with Law Enforcement Agencies (LEAs) in order to provide a lawful interception (LI) similarly as it is required from telecommunication operators. LI in IP networks is not as easy as in telecommunications. One major challenge is the identification of a tracked person. IPv6 brings new challenges, e.g. a support of temporary IP addresses, privacy extension or default IPv6 tunnels. There are LI implementation recommendations given by US law (Communications Assistance for Law Enforcement Act - CALEA) or EU standards (defined by European Telecommunications Standards Institute - ETSI). Nevertheless, these documents do not cover IPv6 networks. This paper overviews related documents and current state-of-the-art. Then, it identifies issues of IPv6 LI and proposes possible approach to user’s identity detection, and other
- The aim of this paper is to enumerate major issues in designing a lawful interception system for IPv6 networks. Today, network and content providers are required to cooperate with Law Enforcement Agencies (LEAs) in order to provide a lawful interception (LI) similarly as it is required from telecommunication operators. LI in IP networks is not as easy as in telecommunications. One major challenge is the identification of a tracked person. IPv6 brings new challenges, e.g. a support of temporary IP addresses, privacy extension or default IPv6 tunnels. There are LI implementation recommendations given by US law (Communications Assistance for Law Enforcement Act - CALEA) or EU standards (defined by European Telecommunications Standards Institute - ETSI). Nevertheless, these documents do not cover IPv6 networks. This paper overviews related documents and current state-of-the-art. Then, it identifies issues of IPv6 LI and proposes possible approach to user’s identity detection, and other (en)
|
Title
| - Designing Lawful Interception in IPv6 Networks
- Designing Lawful Interception in IPv6 Networks (en)
|
skos:prefLabel
| - Designing Lawful Interception in IPv6 Networks
- Designing Lawful Interception in IPv6 Networks (en)
|
skos:notation
| - RIV/00216305:26230/11:PU96055!RIV12-MV0-26230___
|
http://linked.open...avai/predkladatel
| |
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| - P(VG20102015022), Z(MSM0021630528)
|
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/11:PU96055
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Lawful interception, IPv6, networking user identity, communication tracking. (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Security and Protection of Information
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Grégr, Matěj
- Kajan, Michal
- Matoušek, Petr
- Polčák, Libor
- Veselý, Vladimír
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |