Course wireless telephony WTA security requirements

Course wireless telephony WTA security requirements

2. DOCUMENTS STATUS
2.1COPYRIGHT NOTICE
2.2ERRATA
2.3COMMENTS
3. REFERENCES
3.1NORMATIVE REFERENCES
4. DEFINITIONS AND ABBREVIATIONS
4.1DEFINITIONS
4.2ABBREVIATIONS
5. INTRODUCTION
5.1ARCHITECTURAL OVERVIEW
5.2WTA SERVICES
5.3ACCESS TO REPOSITORY
6. WTA SECURITY REQUIREMENTS
6.1SECURITY DELEGATION
6.2ACCESS CONTROL
6.3USER PERMISSIONS
6.4WTA SECURITY MODEL
7. STATE MODEL
7.1SESSION MANAGEMENT
7.2USER-AGENT CONTEXT
7.3EVENT PARAMETERS
7.4SERVICE INDICATION
7.5CALL STATE MANAGEMENT
8. REPOSITORY
8.1CHANNEL LOADING
8.2CHANNEL UNLOADING
8.3REPOSITORY GC
8.4PROGRAMMING THE REPOSITORY
8.5REPOSITORY ACCESS POLICY
9. EVENT HANDLING
9.1DESCRIPTION
9.2EVENT HANDLING PROCESS
9.3TEMPORARY EVENT BINDINGS
9.4GLOBAL EVENT BINDINGS
9.5EVENT PARAMETER REFERENCE
9.6FALLBACK HANDLING
10.EXAMPLES OF WTA SERVICES
10.1 INTRODUCTION
10.2 INCOMING CALL SELECTION
10.3 VOICE MAIL

WTA Services

WTA services are what the end-user ultimately experiences from using the WTA framework. A WTA service appears to the client in the form of various content formats, e.g. WML, WMLScript etc. The WTA user-agent executes content that is persistently stored in the client’s repository or content retrieved from a WTA server. The framework also allows the WTA user-agent to act on events from the mobile network (e.g. an incoming call).

LIRE AUSSI :  Structure des réseaux de l'entreprise

Si le lien ne fonctionne pas correctement, veuillez nous contacter (mentionner le lien dans votre message)
Wireless telephony WTA security requirements (490 KO) (Cours PDF)
Course wireless telephony WTA security requirements

Télécharger aussi :

Laisser un commentaire

Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *