{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T16:09:32Z","timestamp":1694621372434},"reference-count":15,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2003,5,1]],"date-time":"2003-05-01T00:00:00Z","timestamp":1051747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003,5,1]]},"abstract":"This paper surveys the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system which is known in Europe as UMTS. The main features of the security architecture include user specific features protecting the access of the IMS user, such as authentication and key agreement when a user registers and integrity protection of IMS access signalling, but also features for the user, independent protection of SIP signalling in the IMS core network. Authenticated registration is given an in\u2010depth treatment.<\/jats:p>","DOI":"10.1108\/10662240310469051","type":"journal-article","created":{"date-parts":[[2003,4,18]],"date-time":"2003-04-18T23:08:54Z","timestamp":1050707334000},"page":"100-106","source":"Crossref","is-referenced-by-count":0,"title":["Security for IP multimedia services in the 3GPP third generation mobile system"],"prefix":"10.1108","volume":"13","author":[{"given":"G.","family":"Horn","sequence":"first","affiliation":[]},{"given":"D.","family":"Kr\u00f6selberg","sequence":"additional","affiliation":[]},{"given":"K.","family":"M\u00fcller","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022031120085761300_B1","unstructured":"3GPP TSG SA WG2 Architecture (2002), \u201cIP Multimedia (IM), Subsystem \u2013 Stage 2\u201d, 3G TS 23.228, v5.5.0, June, available at: www.3gpp.org\/specs\/specs.htm"},{"key":"key2022031120085761300_B2","unstructured":"3GPP TSG SA WG3 Security (2002), \u201cSecurity architecture (Release 4)\u201d, 3G TS 33.102 v4.3.0, January, available at: www.3gpp.org\/specs\/specs.htm"},{"key":"key2022031120085761300_B3","unstructured":"3GPP TSG SA WG3 Security (2002), \u201cAccess security for IP\u2010based services\u201d, 3G TS 33.203 v5.3.0, September, available at: www.3gpp.org\/specs\/specs.htm"},{"key":"key2022031120085761300_B4","unstructured":"3GPP TSG SA WG3 Security (2002), \u201cWork item description: network domain security; authentication framework\u201d; S3#26, 19\u201022 November; Tdoc S3\u2010020640; ftp:\/\/www.3gpp.org\/TSG_SA\/WG3_Security\/TSGS3_26_Oxford\/Docs"},{"key":"key2022031120085761300_B5","unstructured":"Arkko, J., Torvinen, V., Haukka, T., Sen, S. and Valerius, L. (2002), \u201cSecurity mechanism agreement for SIP connections\u201d, IETF Internet Draft draft\u2010sip\u2010sec\u2010agree\u201005.txt, November, available at: www.ietf.org (Draft will soon become IETF RFC.)"},{"key":"key2022031120085761300_B6","unstructured":"Garcia, M. et al. (2002), \u201c3GPP requirements on SIP\u201d, IETF Internet Draft draft\u2010garcia\u2010sipping\u20103gpp\u2010reqs\u201003, March, available at: www.ietf.org"},{"key":"key2022031120085761300_B7","doi-asserted-by":"crossref","unstructured":"Harkins, D. and Carrel, D. (1998), \u201cThe Internet key exchange (IKE)\u201d, IETF RFC 2409, available at: www.ietf.org","DOI":"10.17487\/rfc2409"},{"key":"key2022031120085761300_B8","unstructured":"Horn, G. and Howard, P. (2000), \u201cReview of third generation mobile system security architecture\u201d, Proceedings of ISSE 2000, Barcelona, 27\u201029 September."},{"key":"key2022031120085761300_B9","doi-asserted-by":"crossref","unstructured":"Kent, S. and Atkinson, R. (1998a), \u201cSecurity architecture for the Internet protocol\u201d, IETF RFC\u20102401, available at: www.ietf.org","DOI":"10.17487\/rfc2401"},{"key":"key2022031120085761300_B10","doi-asserted-by":"crossref","unstructured":"Kent, S. and Atkinson, R. (1998b), \u201cIP encapsulating security payload (ESP)\u201d, IETF RFC\u20102406.","DOI":"10.17487\/rfc2406"},{"key":"key2022031120085761300_B11","unstructured":"Niemi, A., Arkko, J. and Torvinen, V. (2002), \u201cHTTP digest authentication using AKA\u201d, RFC 3310, September, available at: www.ietf.org"},{"key":"key2022031120085761300_B12","doi-asserted-by":"crossref","unstructured":"Rosenberg, J. and Schulzrinne, H. et al. (2002), \u201cSIP: session initiation protocol\u201d, IETF RFC 3261, June, available at: www.ietf.org","DOI":"10.17487\/rfc3261"},{"key":"key2022031120085761300_B13","unstructured":"Schiller, J. (2002), \u201cDesigning secure protocols\u201d, available at: jis.mit.edu\/sectutorial\/"},{"key":"key2022031120085761300_B14","doi-asserted-by":"crossref","unstructured":"Franks, J. et al. (1999), \u201cHTTP authentication: basic and digest access authentication\u201d, IETF RFC 2617, available at: www.ietf.org","DOI":"10.17487\/rfc2617"},{"key":"key2022031120085761300_B15","unstructured":"Roach, A. (2002), \u201cEvent notification in SIP\u201d, IETF Internet Draft, draft\u2010roach\u2010sip\u2010subscribe\u2010notify\u201003.txt, February, available at: www.ietf.org"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310469051\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310469051\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T20:34:19Z","timestamp":1647030859000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/10662240310469051\/full\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,5,1]]},"references-count":15,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,5,1]]}},"alternative-id":["10.1108\/10662240310469051"],"URL":"https:\/\/doi.org\/10.1108\/10662240310469051","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2003,5,1]]}}}