3. SecSIP implementation
SecSIP's modular, flexible architecture means it can be deployed in any type of infrastructure built around the SIP protocol. SecSIP is built around an execution engine to ensure compliance with VeTo protection rules. Around this core, the environment provides a set of components implemented in the form of plug-ins. Figure 7 shows the overall architecture of SecSIP.
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
SecSIP implementation
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!