A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks |
Lee, Myoung-Rak
(Department of Computer Science and Engineering, Korea University)
Lee, Taek (Department of Computer Science and Engineering, Korea University) Yoon, Byung-Sik (Department of WiBro Convergence Research Team, ETRI) Kim, Hyo-Gon (Department of Computer Science and Engineering, Korea University) In, Hoh Peter (Department of Computer Science and Engineering, Korea University) |
1 | [Online]. Available: http://www.newport-networks.com/cust-docs/87-Law ful-Intercept.pdf |
2 | ETSI ES 201 158: Telecommunications security; Lawful Interception (LI); Requirements for network functions, 2002 |
3 | ETSI TS 101 331: Telecommunications Security; Lawful Interception (LI); Requirements of law enforcements agencies |
4 | Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103–414, 108 Stat. 4279, Congress of the United States of America |
5 | ETSI TS 101 331: Technical Specification Lawful Interception (LI); Requirements of law enforcement agencies, 2006 |
6 | B. Karpagavinayagam, R. State, and O. Festor, "Monitoring architecture for lawful interception in VoIP networks," in Proc. IEEE ICIMP, 2007 |
7 | 3GPP TS 33.106: Technical Specification Group Services and System Aspects; 3G Security; Lawful interception requirements (Release 5), 2002 |
8 | ETSI TS 101.671: Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic, 2009 |
9 | ETSI, TR 101 944: Telecommunications Security; Lawful Interception (LI); Issues on IP interception, 2001 |
10 | M. Gorge, "Lawful interception key concepts, actors, trends and best practice considerations," Elsevier Computer Fraud & Security, vol. 2007, no. 9, Sept. 2007, pp. 10–14 DOI ScienceOn |
11 | Accreditation: A Proven Management Model, 2008. [Online]. Available: http://www.calea.org/Online/AnnualReports/annual-reports.htm |
12 | A. Milannovic and I. Matosevic, "Distributed system for lawful interception in VoIP networks," in Proc. EUROCON, 2003 |
13 | S. Gleave, "The mechanics of lawful interception," Netw. Security, vol. 2007, no. 5, pp 8–11, 2007 DOI ScienceOn |
14 | ETSI, ES 201 671: Telecommunications Security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic, 2007 |
15 | ETSI TR 101.514: Digital Cellular Telecommunications System (Phase 2+); lawful interception requirement for GSM, 2001 |
16 | ETSI, TS 102 232-1: Lawful Interception (LI); Handover specification for IP delivery, 2008 |
17 | RFC2804 IETF, Policy on Wiretapping, 2000 |
18 | "WiMAX Lawful Interception for Communication Service Providers," Verint Systems white paper, 2008 |
19 | National Handover Interface Specification version 1.0, Home Office, 2002. [Online]. Available: http://www.gliif.org/standards.htm |
20 | ETSI TS 141 033: Digital cellular telecommunications system (Phase 2+); Lawful interception requirement for GSM (3GPP TR 41.033 version 8.0.0 Release8), 2009 |