15 pages matching confidentiality in this book
Results 1-3 of 15
What people are saying - Write a review
We haven't found any reviews in the usual places.
Other editions - View all
access control Advanced Intelligent Network AIN services applications AT&T Bell Laboratories audit authentication automation Bell Canada Bell-Northern Research Bellcore building blocks C-Log data Call gap Call History Log common carrier communication concurrency control confidentiality congestion cryptosystem deployment downsizing end-to-end environment Fault Management GO Intelligence implementation Information Resource Management integrity Interconnect interfaces intrusion detection ISDN ISDN-UP LEC network lockingTransactionID management and administration mechanisms messages network elements Network Layer Network Management Network Operations network security network traffic manager NOMS 92 NTM center NTM data NTM strategy OAM Intelligence OAM&P Operational Support Operational Support Systems Operations Systems protocol public-key requirements Resource Management Systems security management security services specific SS7 Network Traffic SS7 NTM standards subnetwork switch telecommunications Telecommunications Network test call controller test call processing Testing OS user transactionID transactions trigger trunk group controls USA Chair USA SESSION