Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Profiling the Protection of Sensitive Enterprise Multimedia Communication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Falk, R. ; Corp. Technol., Siemens AG, Munich ; Fries, S.

Voice is, besides email, the major personal communication technology used by employees of an enterprise. Additionally, multimedia communication is getting used more and more in the form of video conferences to decrease travel cost and support environmental protection. Besides oral communication also documents, e.g. presentations, may be shared. Thus sensitive information is likely to be exchanged as part of the communication. Hence, an appropriate security level is of great relevance to protect enterprisepsilas confidential information. Historically, security measures for communication systems have either been targeted to prevent fraud, thereby securing the operatorpsilas business model, or to provide military-class end-to-end encryption. Neither approach targets the security objectives of enterprises using private and public communication infrastructure for sensitive business exchanges. It is common practice within enterprises to define different data protection classes and associated rules that have to be respected when dealing with sensitive information. Thus, the main contribution here is on one hand an evaluation of relevant available or known security technology from the perspective of protecting sensitive enterprise communication, and a roadmap for an incremental, step-wise introduction of security features in multimedia (including voice and video) communication that allows for a step-wise (incremental) introduction of security features required for different security levels.

Published in:

Internet and Web Applications and Services, 2009. ICIW '09. Fourth International Conference on

Date of Conference:

24-28 May 2009