2019
DOI: 10.1007/978-3-030-03101-5_21
|View full text |Cite
|
Sign up to set email alerts
|

VISECO: An Annotated Security Management Framework for 5G

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…All user plane info, considering the 4G-LTE and 5G architectures, must be confidential and protected against unauthorized applications. The implementations of the 5G network (like, the transport system and medical monitoring [57][58][59][60][61] the basic data encryption algorithms have been commonly used for user privacy. To encrypt or decrypt 5 G data with one private key, you can use the symmetrical key encryption algorithm.…”
Section: Confidentialitymentioning
confidence: 99%
“…All user plane info, considering the 4G-LTE and 5G architectures, must be confidential and protected against unauthorized applications. The implementations of the 5G network (like, the transport system and medical monitoring [57][58][59][60][61] the basic data encryption algorithms have been commonly used for user privacy. To encrypt or decrypt 5 G data with one private key, you can use the symmetrical key encryption algorithm.…”
Section: Confidentialitymentioning
confidence: 99%
“…Additionally, the search terms "OpenC2 information security defense" OR "OpenC2 command" OR "OpenC2" applied to common academic literature databases and Google Scholar yield further relevant papers. [120], [100], [121], [122] and [123] briefly describe OpenC2 or highlight its use within the scope of adjacent research. Applebaum et al [42] emphasize integration of OpenC2 with their proposed playbook specification format RECAST.…”
Section: Iacd -Summary and Recommendationsmentioning
confidence: 99%