My LinkedIn Profile

Sunday 27 November 2011

LTE brings new security concerns for telcos.

link - LTE brings new security concerns for telcos.

As long-term evolution (LTE) networks, such as Telstra's new 4G network, bring about super fast mobile broadband to consumers across the globe, they could also potentially open up smartphones, tablets and other devices to hacks that previously only concerned PC users, according to network vendor Alcatel-Lucent.

Saturday 26 November 2011

Insecure 2G needs global fix

link - Insecure 2G needs global fix: AusCERT

AusCert senior security analyst Marco Ostini has called for drastic international action to fix security holes in the 2G cellular network that currently leave everyone vulnerable to attack, even though telcos are moving to 4G networks and beyond.

Tuesday 20 September 2011

www.CryptoClouds.com - Cryptography for Clouds!

My new site - www.CryptoClouds.com - Cryptography for Clouds!

Information about Modern (Post-quantum and Fully homomorphic) Cryptography, DNSSEC, Best Practices for Cloud Security, Cloud Security Audit, some materials from Cloud Security Alliance and Trusted Cloud Initiative.

Tuesday 13 September 2011

Encryption is Not Enough for Cloud Security

Link - Encryption is Not Enough for Cloud Security

Tags - policy-based key management, unique server authentication using identity-based and integrity-based validation.

Sunday 28 August 2011

Clouds for Telecom industry.

Please see my new site - CloudsTele.com - information about all types of Clouds for Telecom industry.

Saturday 25 June 2011

Cloud for mobile operators.

IT Cutting Edge now it is CLOUD.

For big and transnational mobile operators - cloud (distributed) architecture for mobile network, global roaming, picocell, femtocell, Microcell, Wireless access point already exist.
And of course, for this Cloud architecture we require Cloud Billing :-).
Mobile operators in some countries use common core network - it's cheaper for each operator. Cloud technology is cheaper too. Many ways to implement this in mobile telecom.

But, for the first, we need to solve some access and security problems regarding this direction.

For further reading see my site - CloudsTele.com - information about all types of Clouds for Telecom industry.

Sunday 20 February 2011

Globalisation of Mobile and Wireless Communications: Today and in 2020

Springer, 2010 - Technology & Engineering - 300 pages
Globalization of Mobile and Wireless Communications is a collection of cutting-edge research in mobile and wireless communications with impact on developments as far forward as 2020 and beyond. The book draws upon the insights and performed research work of leading experts in the field. Topics of discussion are related but not limited to spectrum-efficient radio interface technologies, enabling technologies for reconfigurability, wireless sensor networks, cognitive networks, coherent wireless transmission, algorithmic design, middleware for novel services and applications. The material has been edited to provide a vision for the future of mobile and wireless, towards a dynamic communication system that breaks down the barriers between communications means; and evolves and integrates business models and culture to match the technological evolution. In addition, strategies on how to overcome the technological challenges for achieving that vision are also outlined.

book's link

Saturday 29 January 2011

Guidelines on Security and Privacy in Public Cloud Computing - NIST SP 800-144 DRAFT

Jan. 28, 2011
NIST SP 800-144 provides an overview of the security and privacy challenges for public cloud computing and gives recommendations that organizations should consider when outsourcing data, applications, and infrastructure to a public cloud environment.

NIST SP 800-145 restates the existing NIST cloud computing definition as a formal NIST publication.

DRAFT link

Cryptographic Algorithms and Key Sizes for Personal Identification Verification

January 5, 2011

NIST announces that Special Publication 800-78-3, Cryptographic Algorithms and Key Sizes for Personal Identity Verification, has been released. The document has been modified 1) to align the set of acceptable RSA public key exponents with FIPS 186-3 and 2) to permit the use of SHA-1 after 12/31/2010 when signing revocation information, under limited circumstances

link

Transitions Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths - NIST 800-131A

January 13, 2011

NIST announces the completion of Special Publication (SP) 800-131A, Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths. This Recommendation provides the approach for transitioning from the use of one algorithm or key length to another, as initially addressed in Part 1 of SP 800-57.

Special Publication (SP) 800-131A link