Security Considerations for Voice Over IP Systems

Total Page:16

File Type:pdf, Size:1020Kb

Security Considerations for Voice Over IP Systems Special Publication 800-58 Security Considerations for Voice Over IP Systems Recommendations of the National Institute of Standards and Technology D. Richard Kuhn, Thomas J. Walsh, Steffen Fries NIST SP 800-58 Voice Over IP Security _____________________________________________________________________________ II NIST SP 800-58 Voice Over IP Security _________________________________________________________________________ NIST Special Publication 800-58 Security Considerations for Voice Over IP Systems Recommendations of the National Institute of Standards and Technology C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 January 2005 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Shashi Phoha, Director III NIST SP 800-58 Voice Over IP Security _____________________________________________________________________________ Note to Readers The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. T.J. Walsh and D.R. Kuhn are employees of NIST; S. Fries is an employee of Siemens AG. For questions or comments on this document, contact [email protected]. Acknowledgments This document has benefited from review and comment by many experts. We particularly want to thank Mike Stauffer, of Booz Allen Hamilton, for his careful review and many contributions to improving the quality of this publication. Appendix A is derived from an internal NIST report by Tony Meehan and Tyler Moore of the University of Tulsa. Many people provided us with helpul comments and suggestions for improvements to the first draft of this document. We are grateful to Tim Grance, John Larson and colleagues at Sprint, Stephen Whitlock, David Waring, Steven Ungar, Larry L. Brock, Ron Rice, John Dabnor, Susan Landau, Cynthia Des Lauriers, Victor Marshall, Nora Wheeler, Anthony Smith, Curt Barker, Gerald Maguire, Frank Derks, Ben Halpert, Elaine Starkey, William Ryberg, Loraine Beyer, Terry Sherald, Gill Williams, Roberta Durant, Adrian Gardner, Rich Graveman, David Harrity, Lakshminath Dondeti, Mary Barnes, Cedric Aoun, Mike Lee, Paul Simmons, Marcus Leech, Paul Knight, Ken van Wyk, Manuel Vexler, and John Kelsey. IV NIST SP 800-58 Voice Over IP Security _________________________________________________________________________ Table of Contents Executive Summary and Recommendations .......................................................................................... 3 1 Introduction ...................................................................................................................................... 10 1.1 Authority .................................................................................................................................... 10 1.2 Document Scope and Purpose .................................................................................................. 10 1.3 Audience and Assumptions....................................................................................................... 11 1.4 Document Organization ............................................................................................................ 11 2 Overview of VOIP............................................................................................................................ 13 2.1 VOIP Equipment ....................................................................................................................... 13 2.2 Overview of VOIP Data Handling ........................................................................................... 14 2.3 Cost............................................................................................................................................. 16 2.4 Speed and Quality...................................................................................................................... 16 2.5 Privacy and Legal Issues with VOIP........................................................................................ 17 2.6 VOIP Security Issues................................................................................................................. 17 3 Quality of Service Issues.................................................................................................................. 19 3.1 Latency....................................................................................................................................... 19 3.2 Jitter ............................................................................................................................................ 20 3.3 Packet Loss ................................................................................................................................ 21 3.4 Bandwidth & Effective Bandwidth .......................................................................................... 22 3.5 The Need for Speed ................................................................................................................... 24 3.6 Power Failure and Backup Systems ......................................................................................... 24 3.7 Quality of Service Implications for Security............................................................................ 25 4 H.323................................................................................................................................................... 26 4.1 H.323 Architecture .................................................................................................................... 26 4.2 H.235 Security Profiles.............................................................................................................. 28 4.2.1 H.235v2.................................................................................................................................. 29 4.2.2 H.235v3.................................................................................................................................. 32 4.2.3 H.323 Annex J ....................................................................................................................... 36 4.2.4 H.323 Security Issues ............................................................................................................ 36 4.3 Encryption Issues and Performance.......................................................................................... 37 5 SIP....................................................................................................................................................... 39 5.1 SIP Architecture......................................................................................................................... 39 5.2 Existing Security Features within the SIP Protocol ................................................................. 40 5.2.1 Authentication of Signaling Data using HTTP Digest Authentication............................... 41 5.2.2 S/MIME Usage within SIP.................................................................................................... 41 5.2.3 Confidentiality of Media Data .............................................................................................. 41 5.2.4 TLS usage within SIP ............................................................................................................42 5.2.5 IPsec usage within SIP..........................................................................................................42 5.2.6 Security Enhancements for SIP ............................................................................................ 42 5.2.7 SIP Security Issues ................................................................................................................ 44 6 Gateway Decomposition.................................................................................................................. 47 6.1 MGCP ........................................................................................................................................ 47 6.1.1 Overview................................................................................................................................ 47 V NIST SP 800-58 Voice Over IP Security _________________________________________________________________________
Recommended publications
  • Analysis of Server-Smartphone Application Communication Patterns
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Aaltodoc Publication Archive Aalto University School of Science Degree Programme in Computer Science and Engineering Péter Somogyi Analysis of server-smartphone application communication patterns Master’s Thesis Budapest, June 15, 2014 Supervisors: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Aalto University School of Science ABSTRACT OF THE Degree programme in Computer Science and MASTER’S THESIS Engineering Author: Péter Somogyi Title: Analysis of server-smartphone application communication patterns Number of pages: 83 Date: June 15, 2014 Language: English Professorship: Data Communication Code: T-110 Software Supervisor: Professor Jukka Nurminen, Aalto University Professor Tamás Kozsik, Eötvös Loránd University Instructor: Máté Szalay-Bekő, M.Sc. Ph.D. Abstract: The spread of smartphone devices, Internet of Things technologies and the popularity of web-services require real-time and always on applications. The aim of this thesis is to identify a suitable communication technology for server and smartphone communication which fulfills the main requirements for transferring real- time data to the handheld devices. For the analysis I selected 3 popular communication technologies that can be used on mobile devices as well as from commonly used browsers. These are client polling, long polling and HTML5 WebSocket. For the assessment I developed an Android application that receives real-time sensor data from a WildFly application server using the aforementioned technologies. Industry specific requirements were selected in order to verify the usability of this communication forms. The first one covers the message size which is relevant because most smartphone users have limited data plan.
    [Show full text]
  • Application Note IPTV Services
    Application Note Contents Title Managing IPTV Performance Overview.......................................................... 1 Series IP Video Performance Management IPTV Services .................................................. 1 Date February 2008 Factors Affecting the Performance of IPTV.... 2 Video Impairments .......................................... 4 Video Performance Metrics ................................ 5 IPTV, Internet TV, and Video on Demand provide exciting new revenue opportunities IPTV Performance Management ........................ 6 for service providers. This Application Note Summary .......................................................... 8 describes some of the typical issues and problems affecting IPTV service quality, and introduces a cost-effective approach to service quality monitoring. IPTV Services make it publicly available. IPTV offers exciting new opportunities for service • Video on Demand (VOD) is a service that providers to introduce integrated voice, video, and provides access to movies or other video data services over broadband. A number of video content on demand. This could be part service types can be delivered over IP: of an IPTV service or could be a service offered independently over the Internet. • “IPTV” is generally used to refer to a closed Video over IP service with a broad range In some cases, IPTV services are not seen as of content delivered by a service provider. directly competing with existing cable or satellite Some definitions of IPTV would suggest service but may provide some
    [Show full text]
  • Performance of VBR Packet Video Communications on an Ethernet LAN: a Trace-Driven Simulation Study
    9.3.1 Performance of VBR Packet Video Communications on an Ethernet LAN: A Trace-Driven Simulation Study Francis Edwards Mark Schulz edwardsF@sl .elec.uq.oz.au marksas1 .elec. uq.oz.au Department of Electrical and Computer Engineering The University of Queensland St. Lucia Q 4072 Australia Abstract medium term, we can expect that current LAN technolo- Provision of multimedia communication services on today’s gies will be utilized in the near term for packet transport of packet-switched network infrastructure is becoming increas- video applications [4,5, 61. Characterizing the performance ingly feasible. However, there remains a lack of information of current networks carrying video communications traffic is regarding the performance of multimedia sources operating therefore an important issue. This paper investigates packet in bursty data traffic conditions. In this study, a videotele- transport of real time video communications traffic, charac- phony system deployed on the Ethernet LAN is simulated, teristic of videotelephony applications, on the popular 10 employing high time-resolution LAN traces as the data traf- Mbit/s Ethernet LAN. fic load. In comparison with Poisson traffic models, the Previous work has established that Ethernet is capable of trace-driven cases produce highly variable packet delays, and supporting video communication traffic in the presence of higher packet loss, thereby degrading video traffic perfor- Poisson data traffic [6, 71. However, recent studies of high mance. In order to compensate for these effects, a delay time-resolution LAN traffic have observed highly bursty control scheme based on a timed packet dropping algorithm traffic patterns which sustain high variability over timescales is examined.
    [Show full text]
  • Softphone - Cisco IP Communicator FAQ
    Softphone - Cisco IP Communicator FAQ Getting Started Q. How do I order a Softphone instead of a Desk Phone? You can select a Softphone by the following process; Log a request via the Raise a Service Request button on the bottom of the page get a desk phone to get a Softphone: The form you need to fill in is under – Phones, Faxes, Mobiles and Accessories-- >Desk Phones and Accessories A. Fill in all the required details on the form, to select a Softphone, check the “Phone 1” Box and select the Softphone option from the drop down menu in “New Handset you require” As a softphone requires a headset, please select an option, the standard wired headset will be supplied at no charge, if you require a wireless headset, select this option and we will contact you do discuss the additional costs If you require a Softphone as well as a desk phone, this can be provided but an additional cost of $150 is required to cover the costs of the additional licencing. Q. What is Cisco IP Communicator? Cisco IP Communicator is a desktop application that turns your computer into a full- A. featured Cisco Unified IP Phone, allowing you to place, receive, and otherwise handle calls from any location where you can connect to the corporate network. For example, if you are on a business trip, you can use your IP Communicator to receive calls and check voice messages while you are online. Or, if you are working from home, co-workers can reach you by dialing your work number.
    [Show full text]
  • Communication Protocol for Schools
    Communication Protocol for Schools Communication plays a key role in creating and fostering strong, positive relationships between the school and the home. Communication is a two-way street; our schools share information with our families and community, and our families share information with our schools. The purpose of this document is to guide, manage and improve school-home communication by offering a standard format, structure and sequence for regular, ongoing communication. Communication Channels Communication can take place in a variety of formats. The message and the purpose of the communication can help determine which format is most appropriate. Generally, the more issues-driven and/or detailed the information is, the more direct the communication channel chosen should be. Communication channels include: Face-to-face communication – one-on-one meetings, School Council meetings, Parent-Student- Teacher interviews Telephone conversations Hard copy, written communication – letters sent home from the school, paper school newsletters Electronic communication – email, electronic newsletters, websites, social media When the communication requires a dialogue, such as bringing forward a question or concern or when a discussion is required on a particular topic, the preferred channels of communication are ones that allow for an immediate and ongoing interaction between the people involved. The best formats for this kind of communication are face-to-face conversations or telephone conversations. Schools and families are encouraged to use these direct channels of communication when a topic is complex or requires a dialogue. These more direct forms of communication also help us establish a personal connection, which helps build relationships that we don’t get in other forms of communication.
    [Show full text]
  • SERVIZIO VOIP Dal 2005 Ci Siamo Specializzati Nella Fornitura Di
    SERVIZIO VOIP Dal 2005 ci siamo specializzati nella fornitura di servizi VOIP (Voice Over IP) di elevata qualità, con un’offerta tecnologicamente evoluta, posizionandoci in un segmento di mercato di nicchia. Abbiamo così realizzato un servizio basato su una tecnologia allo stato dell'arte che permette di sostituire le linee telefoniche tradizionali con linee VOIP, garantendone la stessa affidabilità e qualità . guarda il video di presentazione PLUS - Casi di successo documentati (rif. nostro sito Web www.timenet.it – sezione Case History) - Portabilità di ogni tipo di linea , comprese Selezioni Passanti (GNR) su BRI e PRI, dai tutti i principali Operatori , con programmazione temporale concordata con il Cliente della data del passaggio delle linee. - Servizio di backup : è sempre garantita la raggiungibilità del Cliente - Videochiamate punto – punto tra due numerazioni VOIP. - Servizio di deviazione di chiamata e voicemail . - Azzeramento dei costi fissi (canoni linee telefoniche). - Tariffe chiare, senza scatto alla risposta, conteggiate per gli effettivi secondi di conversazione. - Nuove numerazioni geografiche singole o GNR. - Numero di chiamate simultaneo illimitato anche con un solo numero VOIP. - Compatibilità testata con le maggiori piattaforme hardware (centralini e gateway): Avaya, AAstra, Samsung, Siemens, Asterisk, Patton, Audiocodes, Draytek, Linksys, etc… APPROFONDIMENTI CHE TIPO DI LINEE POSSIAMO PORTARE - Linee analogiche (POTS) e ISDN numero principale più numerazioni aggiuntive - Linee ISDN e PRI GNR (Selezione Passante) 10, 100, 1000 numeri - Linee in ULL e native VOIP di altri Operatori DA QUALI OPERATORI POSSIAMO EFFETTUARE LA NUMBER PORTABILITY Possiamo effettuare Number Portability da tutti i principali Operatori: Telecom Italia (anche numerazioni VoIP Alice Business Voce), BT-Albacom, Eutelia, Fastweb, Vodafone e Wind .
    [Show full text]
  • Voice Over Internet Protocol (Voip): a Brief Review
    © APR 2018 | IRE Journals | Volume 1 Issue 10 | ISSN: 2456-8880 Voice over Internet Protocol (VoIP): A Brief Review ANURAG K MADHESHIYA1, KIRAN S KALE2, SHIV K YADAV3, JIGNESHKUMAR R. VALVI4 1,2,3,4 Department of Electronics and Communication, SVNIT Surat, India Abstract -- VoIP stands for Voice over Inter Protocol. It is setting up calls, registering the calls, authenticating a communication protocol mainly used for voice and terminating the call. Protocol belonging to H.323 communication, data transfer and video calling. It is based family of protocol uses TCP and UDP connection for on packet transmission over internet network. Paul Baran transportation. For call registering and call signaling and other researchers developed the packet network in the H.225 protocol is used. For media session mid twentieth century. In 1973 Dany Cohen first demonstrated packet voice in flight simulator application. establishment and controlling H.245 is used. For Due to its digital nature it is easy to operate on this protocol. conferencing T.120 protocol is used [3]-[4]. Index Terms: MGCP, Packet, QoS, SIP I. INTRODUCTION Voice over Internet Protocol also known as Voice over IP and VoIP is a communication standard for transmission of voice signal, data transmission and video conferencing. Actually this technology follow packet switching. In packet switching first the input signal (voice, data, video) converted into digital form so other operation becomes simple after this we do encoding, compressing of digital data to make more secure transmission through channel. Then after this we transmit the signal over the channel. At receiver side we do reverse of it but it also require an addition block before receiver to store packets and reorder these packets because in packet switching different Figure 1: Call flow of H.323 packets follow different path so reaches in random manner.
    [Show full text]
  • Avaya IP Softphone Release 4 Version 1 Online Reference
    Avaya IP Softphone Release 4 Version 1 Online Reference September 2002 About This Guide This guide presents the information contained in the Avaya IP Softphone R4 Version 1 online help. 1 About Avaya IP Softphone Introduction Avaya IP Softphone is a collection of computer telephony integration (CTI) applications that enables you to control telephone calls (both incoming and outgoing) directly from your PC. Avaya IP Softphone enables you to log into your company's server remotely and make and receive telephone calls from the telephone extension. Avaya IP Softphone increases your telecommunications capabilities by providing the following applications: • Avaya IP Softphone Avaya IP Softphone is an application that enables you to control your telephone calls (both incoming and outgoing) directly from your PC. • Avaya iClarity IP Audio Avaya iClarity IP Audio is an application that performs the following functions: o Enables you to log into the server. You must be logged into the server before you can use Avaya IP Softphone to control your telephone calls. o Handles the voice communications when you use Avaya IP Softphone in the Road Warrior configuration (voice over IP). When you make or receive a call with Avaya IP Softphone, Avaya iClarity IP Audio enables you to speak to and hear the other party via a headset connected to your PC or the PC’s microphone and speakers. Avaya IP Softphone Configurations Avaya IP Softphone supports the following three configurations: • Road Warrior Configuration (Voice over IP) The Road Warrior configuration enables travelers to use the full feature set of your company's telephone system from temporary remote locations anywhere in the world (such as a hotel room).
    [Show full text]
  • Voip Primer Voice Over Internet Protocol
    VoIP Primer Voice over Internet Protocol WHY THE NET MAY REPLACE MA BELL: A GUIDE FOR STATE AGING SERVICE SYSTEMS NATIONAL AGING INFORMATION AND REFERRAL SUPPORT CENTER NATIONAL ASSOCIATION OF STATE UNITS ON AGING ½ WASHINGTON, DC VoIP Primer Voice over Internet Protocol Why the Net May Replace Ma Bell : A GUIDE FOR STATE AGING SERVICE SYSTEMS SEPTEMBER 2004 NATIONAL AGING INFORMATION AND REFERRAL SUPPORT CENTER NATIONAL ASSOCIATION OF STATE UNITS ON AGING ½ WASHINGTON, DC This publication is supported in part by grant No. 90-AM-2746 from the Administration on Aging, U.S. Department of Health and Human Services. Grantees undertaking projects under government sponsorship are encouraged to express freely their findings and conclusions. Points of view or opinions therefore for not necessarily reflect official Administration on Aging policy. Table of Contents 1 Introduction 3 VoIP: A Primer 5 How does VoIP Work? 9 Is It Worthwhile? Why Switch? 13 Before You Jump on the Bandwagon 15 Telephones Then and Now 19 Glossary 23 Selected References Introduction “WHO COULD have foreseen what the telephone bells have done to ring out the old ways and to ring in the new; to ring out delay and isolation and to ring in the efficiency and friendliness of a truly united people?" —Herbert N. Casson, The History of the Telephone Fully Illustrated, 1910 nternet Voice, also known as Voice over Internet Protocol (VoIP) or IP Itelephony, allows people to make telephone calls anywhere in the world using a high speed Internet connected computer as a phone. To receive or make a call, VoIP callers simply need to load special software on their computers or use a special computer adapter.
    [Show full text]
  • VOICE OVER INTERNET PROTOCOL (Voip)
    S. HRG. 108–1027 VOICE OVER INTERNET PROTOCOL (VoIP) HEARING BEFORE THE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION UNITED STATES SENATE ONE HUNDRED EIGHTH CONGRESS SECOND SESSION FEBRUARY 24, 2004 Printed for the use of the Committee on Commerce, Science, and Transportation ( U.S. GOVERNMENT PUBLISHING OFFICE 22–462 PDF WASHINGTON : 2016 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Nov 24 2008 14:00 Dec 07, 2016 Jkt 075679 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 S:\GPO\DOCS\22462.TXT JACKIE SENATE COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION ONE HUNDRED EIGHTH CONGRESS SECOND SESSION JOHN MCCAIN, Arizona, Chairman TED STEVENS, Alaska ERNEST F. HOLLINGS, South Carolina, CONRAD BURNS, Montana Ranking TRENT LOTT, Mississippi DANIEL K. INOUYE, Hawaii KAY BAILEY HUTCHISON, Texas JOHN D. ROCKEFELLER IV, West Virginia OLYMPIA J. SNOWE, Maine JOHN F. KERRY, Massachusetts SAM BROWNBACK, Kansas JOHN B. BREAUX, Louisiana GORDON H. SMITH, Oregon BYRON L. DORGAN, North Dakota PETER G. FITZGERALD, Illinois RON WYDEN, Oregon JOHN ENSIGN, Nevada BARBARA BOXER, California GEORGE ALLEN, Virginia BILL NELSON, Florida JOHN E. SUNUNU, New Hampshire MARIA CANTWELL, Washington FRANK R. LAUTENBERG, New Jersey JEANNE BUMPUS, Republican Staff Director and General Counsel ROBERT W. CHAMBERLIN, Republican Chief Counsel KEVIN D. KAYES, Democratic Staff Director and Chief Counsel GREGG ELIAS, Democratic General Counsel (II) VerDate Nov 24 2008 14:00 Dec 07, 2016 Jkt 075679 PO 00000 Frm 00002 Fmt 5904 Sfmt 5904 S:\GPO\DOCS\22462.TXT JACKIE C O N T E N T S Page Hearing held on February 24, 2004 ......................................................................
    [Show full text]
  • The Comcast Softphone User Guide for Microsoft Windows ®
    THE COMCAST SOFTPHONE USER GUIDE FOR MICROSOFT WINDOWS ® THE COMCAST SOFTPHONE USER GUIDE FOR MICROSOFT WINDOWS® 1 CONTENTS Introduction ��������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������3 System Requirements and Devices ������������������������������������������������������������������������������������������������������������������������������������������������������������������3 Login ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������4 Emergency Calling �������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������7 Basics on Using Your Comcast Softphone �����������������������������������������������������������������������������������������������������������������������������������������������������8 Placing A Call ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������� 11 Answering a Call ���������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������12
    [Show full text]
  • An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review
    ORIGINAL PAPER An Evaluation Protocol for Picture Archiving and Communication System: a Systematic Review Mohsen S. Tabatabaei1, ABSTRACT Mostafa Langarizadeh1, Introduction: Picture archiving and communication system (PACS) serves to store, transmit, communi- Kamran Tavakol2 cate and manage medical images. A logical evaluation protocol assists to determine whether the system is technically, structurally and operationally fit. The purpose of this systematic review was to propose a 1Department of Health Information logical evaluation protocol for PACS, particularly useful for new hospitals and other healthcare institutions Management, School of Health Management and Information Sciences, Iran University of in developing countries. Methods and Materials: We systematically reviewed 25 out of 267 full-length Medical Sciences. Tehran, Iran articles, published between 2000 and 2017, retrieved from four sources: Science Direct, Scopus, PubMed 2School of Medicine, University of Maryland and Google Scholar. The extracted data were tabulated and reviewed successively by three independent Baltimore. Baltimore, MD, USA panels of experts that oversaw the design of this study and the process by which the PACS evaluation protocol was systematically developed. Results: The outcome data were ranked by expert panels and Corresponding author: Mohsen S. Tabatabaei, Tel: +98-990-188-0720. E-mail: [email protected] analyzed statistically, with the reliability established at 0.82 based on the Pearson’s correlation coefficient. The essential components and the best options to establish an optimal PACS were organized under nine main sections: system configuration; system network; data storage; data compression; image input; image doi: 10.5455/aim.2017.25.250-253 characteristics; image presentation; communication link; and system security, with a total of 20 compo- ACTA INFORM MED.
    [Show full text]