An SSI-Based Solution to Support Lawful Interception
Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In th...
Saved in:
Published in | Applied sciences Vol. 15; no. 4; p. 2206 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.02.2025
|
Subjects | |
Online Access | Get full text |
ISSN | 2076-3417 2076-3417 |
DOI | 10.3390/app15042206 |
Cover
Abstract | Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the literature, standards and scientific solutions are proposed for the interception procedure and the interaction between the NO and the LEMF. However, no standard has been proposed for the interaction between the LEMF and the LEA. The absence of standards for controlling LEA (or a delegated agency) access to intercepted contents stored by the LEMF is a significant gap that should be overcome. This prevents the implementation of secure, interoperable, and automated procedures, leading to inefficiencies and security risks. In this paper, we propose to cover the above gap by adopting the Self-Sovereign Identity (SSI) paradigm. The adopted research methodology follows a multi-phase approach that includes studying existing solutions, system design, and technical feasibility testing. The study first examines existing standards and identity management frameworks and their limitations. Next, an SSI-based architecture is proposed to manage the interactions between LEA (or a delegated agency) and LEMF. Finally, a proof of concept of the proposed solution written in Python and using the Hyperledger Indy blockchain has been implemented to assess whether our proposal is technically feasible. The proposed solution enhances automation, security, and interoperability in lawful interception. Indeed, it enables machine-readable authorizations, reducing errors and improving efficiency by eliminating manual operations. Additionally, verifiable credentials and decentralized identifiers strengthen security and standardize interactions across jurisdictions, ensuring privacy-preserving identity management. By standardizing interactions between LEA and LEMF, this research contributes to a more secure, privacy-preserving, and legally compliant lawful interception process. |
---|---|
AbstractList | Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the literature, standards and scientific solutions are proposed for the interception procedure and the interaction between the NO and the LEMF. However, no standard has been proposed for the interaction between the LEMF and the LEA. The absence of standards for controlling LEA (or a delegated agency) access to intercepted contents stored by the LEMF is a significant gap that should be overcome. This prevents the implementation of secure, interoperable, and automated procedures, leading to inefficiencies and security risks. In this paper, we propose to cover the above gap by adopting the Self-Sovereign Identity (SSI) paradigm. The adopted research methodology follows a multi-phase approach that includes studying existing solutions, system design, and technical feasibility testing. The study first examines existing standards and identity management frameworks and their limitations. Next, an SSI-based architecture is proposed to manage the interactions between LEA (or a delegated agency) and LEMF. Finally, a proof of concept of the proposed solution written in Python and using the Hyperledger Indy blockchain has been implemented to assess whether our proposal is technically feasible. The proposed solution enhances automation, security, and interoperability in lawful interception. Indeed, it enables machine-readable authorizations, reducing errors and improving efficiency by eliminating manual operations. Additionally, verifiable credentials and decentralized identifiers strengthen security and standardize interactions across jurisdictions, ensuring privacy-preserving identity management. By standardizing interactions between LEA and LEMF, this research contributes to a more secure, privacy-preserving, and legally compliant lawful interception process. |
Audience | Academic |
Author | Canino, Aurelio Loris Lax, Gianluca Buccafurri, Francesco Laurenda, Annunziata De Angelis, Vincenzo |
Author_xml | – sequence: 1 givenname: Francesco orcidid: 0000-0003-0448-8464 surname: Buccafurri fullname: Buccafurri, Francesco – sequence: 2 givenname: Aurelio Loris surname: Canino fullname: Canino, Aurelio Loris – sequence: 3 givenname: Vincenzo orcidid: 0000-0001-9731-3641 surname: De Angelis fullname: De Angelis, Vincenzo – sequence: 4 givenname: Annunziata surname: Laurenda fullname: Laurenda, Annunziata – sequence: 5 givenname: Gianluca orcidid: 0000-0002-5226-0870 surname: Lax fullname: Lax, Gianluca |
BookMark | eNpNUU1Lw0AQXaSCtfbkHwh4lNT9zu6xFj8CBQ_R8zLZbEpKmo2bBPHfu7UincsMb-Y9HvOu0azznUPoluAVYxo_QN8TgTmlWF6gOcWZTBkn2exsvkLLYdjjWJowRfAc8XWXFEWePsLgqqTw7TQ2vktGnxRT3_swJlv4qqc2ybvRBev64_oGXdbQDm751xfo4_npffOabt9e8s16m1qqyZhay7W0vMTYOW4tAAMLdcUVCKIrkKJkqhQ4Y7S0UGKubKaBUEwwF6pUgi1QftKtPOxNH5oDhG_joTG_gA87A2FsbOsMlUKCdE4xQjljpQZWVTUBmWmZVZpGrbuTVh_85-SG0ez9FLpo3zCSYSUyEYkLtDpd7SCKNl3txxBNW6jcobHx33UT8bWiGkshCImE-xPBBj8MwdX_Ngk2x1jMWSzsB4P4fnM |
Cites_doi | 10.1016/j.clsr.2023.105867 10.1109/ACCESS.2021.3131012 10.1016/j.aeue.2007.08.006 10.1109/ACCESS.2020.3034299 10.1007/978-3-319-74872-6_5 10.1007/978-3-030-29053-5 10.1109/LCN52139.2021.9525011 10.1016/j.dsm.2024.04.003 10.1109/BESC51023.2020.9348298 10.1365/s43439-022-00074-7 10.1145/3277570.3277578 10.1109/ICIMP.2007.27 10.3390/app14010139 10.1145/3477314.3507202 10.1007/s12599-023-00830-x 10.1109/NCA.2019.8935015 10.1007/978-3-030-86611-2_2 10.3390/fi14080243 10.3389/fbloc.2021.626726 10.1109/ICCWS53234.2021.9702980 10.1016/j.cose.2024.103771 10.17487/rfc3415 10.1109/ISSE49799.2020.9272223 10.1109/TrustCom/BigDataSE.2018.00195 10.1016/S1361-3723(07)70116-1 10.3390/fi13120301 10.1109/MCOMSTD.001.1900029 10.1109/ACCESS.2024.3357940 10.1016/j.ijinfomgt.2020.102136 10.1007/s11572-023-09704-5 10.1007/978-981-99-3935-0 10.1016/j.diin.2015.04.005 10.1109/ETFA.2019.8869262 10.1155/2021/8873429 10.1016/j.cosrev.2018.10.002 10.1109/ISNCC49221.2020.9297357 10.1155/2022/5429195 10.1016/j.arcontrol.2023.02.004 10.1016/j.telpol.2005.06.010 10.1007/978-3-030-75539-3_22 10.1016/j.matpr.2021.03.083 10.3389/fbloc.2024.1443362 10.3390/s22134714 10.1016/j.trc.2020.01.002 10.3390/s21020428 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2025 MDPI AG 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2025 MDPI AG – notice: 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS DOA |
DOI | 10.3390/app15042206 |
DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central ProQuest One ProQuest Central ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: BENPR name: ProQuest Central url: http://www.proquest.com/pqcentral?accountid=15518 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Sciences (General) |
EISSN | 2076-3417 |
ExternalDocumentID | oai_doaj_org_article_2656a6ee8312433b9a3ddf1a67967d92 A829065511 10_3390_app15042206 |
GeographicLocations | United States Germany |
GeographicLocations_xml | – name: Germany – name: United States |
GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC PUEGO TUS PMFND ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c291t-cc496c4b00ee4ccaa3acafd48a519da65b38b50732bcab048c79a12010458b853 |
IEDL.DBID | 8FG |
ISSN | 2076-3417 |
IngestDate | Wed Aug 27 01:18:39 EDT 2025 Thu Jul 24 12:11:12 EDT 2025 Tue Jun 10 21:01:15 EDT 2025 Wed Oct 01 06:53:10 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c291t-cc496c4b00ee4ccaa3acafd48a519da65b38b50732bcab048c79a12010458b853 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-0448-8464 0000-0002-5226-0870 0000-0001-9731-3641 |
OpenAccessLink | https://www.proquest.com/docview/3170857524?pq-origsite=%requestingapplication% |
PQID | 3170857524 |
PQPubID | 2032433 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_2656a6ee8312433b9a3ddf1a67967d92 proquest_journals_3170857524 gale_infotracacademiconefile_A829065511 crossref_primary_10_3390_app15042206 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2025-02-01 |
PublicationDateYYYYMMDD | 2025-02-01 |
PublicationDate_xml | – month: 02 year: 2025 text: 2025-02-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Applied sciences |
PublicationYear | 2025 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | ref_50 Pleva (ref_65) 2012; 5 ref_58 ref_56 ref_10 Turanjanin (ref_11) 2023; 4 ref_53 ref_52 ref_51 Davie (ref_23) 2019; 3 ref_19 ref_17 ref_15 ref_59 Gayvoronskaya (ref_14) 2018; 30 Regueiro (ref_57) 2021; 9 Imperl (ref_70) 2008; 62 Omand (ref_3) 2024; 18 ref_25 ref_69 ref_24 ref_68 ref_67 Gorge (ref_12) 2007; 2007 Khovratovich (ref_18) 2017; 17 ref_66 ref_21 ref_20 Helliar (ref_27) 2020; 54 ref_64 ref_63 ref_62 ref_29 ref_28 Alamillo (ref_72) 2021; 2 Aparicio (ref_71) 2015; 14 Tobin (ref_13) 2016; 29 Farooq (ref_46) 2020; 111 ref_36 ref_33 Guhl (ref_7) 2008; 17 ref_32 Voigt (ref_37) 2017; Volume 10 ref_31 ref_30 Bartolomeu (ref_47) 2020; 8 Li (ref_4) 2023; 55 Buccafurri (ref_16) 2024; 140 Doronin (ref_1) 2023; 51 Soltani (ref_35) 2021; 2021 ref_39 Sedlmeir (ref_34) 2024; 66 ref_38 Satybaldy (ref_22) 2024; 12 Bronitt (ref_60) 2005; 29 Abelson (ref_61) 2015; 1 ref_45 ref_44 ref_43 ref_42 Ren (ref_26) 2022; 2022 ref_41 ref_40 Shuaib (ref_55) 2023; 81 ref_2 Ling (ref_54) 2024; 7 ref_49 ref_48 ref_9 ref_8 ref_5 ref_6 |
References_xml | – ident: ref_9 – ident: ref_32 – volume: 51 start-page: 105867 year: 2023 ident: ref_1 article-title: “Lawful interception–A market access barrier in the European Union”? publication-title: Comput. Law Secur. Rev. doi: 10.1016/j.clsr.2023.105867 – ident: ref_68 – volume: 9 start-page: 159965 year: 2021 ident: ref_57 article-title: Enabling identity for the IoT-as-a-service business model publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3131012 – volume: 62 start-page: 610 year: 2008 ident: ref_70 article-title: Border gateway function performance requirements for the lawful intercept of voice at IMS architecture publication-title: AEU-Int. J. Electron. Commun. doi: 10.1016/j.aeue.2007.08.006 – volume: 8 start-page: 196212 year: 2020 ident: ref_47 article-title: Pay as You Go: A Generic Crypto Tolling Architecture publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3034299 – ident: ref_39 – ident: ref_64 doi: 10.1007/978-3-319-74872-6_5 – ident: ref_63 doi: 10.1007/978-3-030-29053-5 – ident: ref_41 doi: 10.1109/LCN52139.2021.9525011 – volume: 7 start-page: 304 year: 2024 ident: ref_54 article-title: Trust Framework for Self-Sovereign ID in Metaverse Health Care Applications publication-title: Data Sci. Manag. doi: 10.1016/j.dsm.2024.04.003 – volume: 2 start-page: 89 year: 2021 ident: ref_72 article-title: Self-Sovereign-Identity & eIDAS: A Contradiction? Challenges and Chances of [eIDAS2] publication-title: Eur. Rev. Digit. Adm. Law – volume: 29 start-page: 18 year: 2016 ident: ref_13 article-title: The inevitable rise of self-sovereign identity publication-title: Sovrin Found. – ident: ref_38 doi: 10.1109/BESC51023.2020.9348298 – volume: 4 start-page: 115 year: 2023 ident: ref_11 article-title: When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach publication-title: Int. Cybersecur. Law Rev. doi: 10.1365/s43439-022-00074-7 – volume: 17 start-page: 38 year: 2017 ident: ref_18 article-title: Sovrin: Digital identities in the blockchain era publication-title: Github Commit Jasonalaw Oct. – ident: ref_6 doi: 10.1145/3277570.3277578 – ident: ref_69 doi: 10.1109/ICIMP.2007.27 – ident: ref_8 – ident: ref_15 doi: 10.3390/app14010139 – volume: 17 start-page: 110 year: 2008 ident: ref_7 article-title: The Communications Assistance for Law Enforcement Act (CALEA) publication-title: Inf. Secur. Journal: Glob. Perspect. – ident: ref_52 – ident: ref_5 doi: 10.1145/3477314.3507202 – volume: 66 start-page: 421 year: 2024 ident: ref_34 article-title: A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity publication-title: Bus. Inf. Syst. Eng. doi: 10.1007/s12599-023-00830-x – ident: ref_42 doi: 10.1109/NCA.2019.8935015 – ident: ref_48 – ident: ref_10 – ident: ref_66 doi: 10.1007/978-3-030-86611-2_2 – ident: ref_25 doi: 10.3390/fi14080243 – ident: ref_44 doi: 10.3389/fbloc.2021.626726 – ident: ref_49 doi: 10.1109/ICCWS53234.2021.9702980 – ident: ref_62 – ident: ref_17 – ident: ref_45 – volume: 140 start-page: 103771 year: 2024 ident: ref_16 article-title: Enforcing security policies on interacting authentication systems publication-title: Comput. Secur. doi: 10.1016/j.cose.2024.103771 – ident: ref_20 doi: 10.17487/rfc3415 – ident: ref_40 doi: 10.1109/ISSE49799.2020.9272223 – ident: ref_51 doi: 10.1109/TrustCom/BigDataSE.2018.00195 – volume: 2007 start-page: 10 year: 2007 ident: ref_12 article-title: Lawful interception – key concepts, actors, trends and best practice considerations publication-title: Comput. Fraud. Secur. doi: 10.1016/S1361-3723(07)70116-1 – ident: ref_28 – ident: ref_53 – ident: ref_59 doi: 10.3390/fi13120301 – volume: 3 start-page: 46 year: 2019 ident: ref_23 article-title: The trust over ip stack publication-title: IEEE Commun. Stand. Mag. doi: 10.1109/MCOMSTD.001.1900029 – ident: ref_30 – volume: 12 start-page: 16151 year: 2024 ident: ref_22 article-title: A taxonomy of challenges for self-sovereign identity systems publication-title: IEEE Access doi: 10.1109/ACCESS.2024.3357940 – volume: 54 start-page: 102136 year: 2020 ident: ref_27 article-title: Permissionless and permissioned blockchain diffusion publication-title: Int. J. Inf. Manag. doi: 10.1016/j.ijinfomgt.2020.102136 – ident: ref_24 – volume: 18 start-page: 805 year: 2024 ident: ref_3 article-title: Examining the Ethics of Spying: A Practitioner’s View publication-title: Crim. Law Philos. doi: 10.1007/s11572-023-09704-5 – ident: ref_2 doi: 10.1007/978-981-99-3935-0 – volume: 14 start-page: 1 year: 2015 ident: ref_71 article-title: Digital Wiretap Warrant: Improving the security of ETSI Lawful Interception publication-title: Digit. Investig. doi: 10.1016/j.diin.2015.04.005 – ident: ref_58 doi: 10.1109/ETFA.2019.8869262 – volume: 2021 start-page: 8873429 year: 2021 ident: ref_35 article-title: A Survey of Self-Sovereign Identity Ecosystem publication-title: Secur. Commun. Netw. doi: 10.1155/2021/8873429 – volume: 30 start-page: 80 year: 2018 ident: ref_14 article-title: A survey on essential components of a self-sovereign identity publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2018.10.002 – ident: ref_31 doi: 10.1109/ISNCC49221.2020.9297357 – volume: 2022 start-page: 5429195 year: 2022 ident: ref_26 article-title: Cryptographic accumulator and its application: A survey publication-title: Secur. Commun. Netw. doi: 10.1155/2022/5429195 – volume: 5 start-page: 191 year: 2012 ident: ref_65 article-title: Voice Quality Measuring Setup with Automatic Voice over IP Call Generator and Lawful Interception Packet Analyzer publication-title: J. Electr. Electron. Eng. – volume: 55 start-page: 237 year: 2023 ident: ref_4 article-title: A critical review of cyber-physical security for building automation systems publication-title: Annu. Rev. Control doi: 10.1016/j.arcontrol.2023.02.004 – ident: ref_21 – volume: Volume 10 start-page: 10 year: 2017 ident: ref_37 article-title: The eu general data protection regulation (gdpr) publication-title: A Practical Guide – volume: 1 start-page: 69 year: 2015 ident: ref_61 article-title: Keys under doormats: Mandating insecurity by requiring government access to all data and communications publication-title: J. Cybersecur. – ident: ref_29 – ident: ref_33 – volume: 29 start-page: 875 year: 2005 ident: ref_60 article-title: Telecommunications interception in Australia: Recent trends and regulatory prospects publication-title: Telecommun. Policy doi: 10.1016/j.telpol.2005.06.010 – ident: ref_50 doi: 10.1007/978-3-030-75539-3_22 – volume: 81 start-page: 203 year: 2023 ident: ref_55 article-title: Self-sovereign identity for healthcare using blockchain publication-title: Mater. Today Proc. doi: 10.1016/j.matpr.2021.03.083 – ident: ref_36 – ident: ref_43 doi: 10.3389/fbloc.2024.1443362 – ident: ref_56 doi: 10.3390/s22134714 – ident: ref_19 – volume: 111 start-page: 588 year: 2020 ident: ref_46 article-title: A multi-layered blockchain framework for smart mobility data-markets publication-title: Transp. Res. Part C Emerg. Technol. doi: 10.1016/j.trc.2020.01.002 – ident: ref_67 doi: 10.3390/s21020428 |
SSID | ssj0000913810 |
Score | 2.312339 |
Snippet | Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It... |
SourceID | doaj proquest gale crossref |
SourceType | Open Website Aggregation Database Index Database |
StartPage | 2206 |
SubjectTerms | Access control Actors Actresses Automation Blockchain Communication Data integrity ETSI Hyperledge Interfaces Interoperability Law enforcement Laws, regulations and rules Privacy Public Key Infrastructure Security management Self-Sovereign Identity Sovrin Trinsic User behavior |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwyIFhCBgjxUAoaIJv6oPbaIqkLARKVulr8ypqgN_587J0VZEAtrlMF5l7t7Z5_fETKugMIKL1RutZrkPIoid1yGXMtK-AgptazwcvLbu1yu-MtarHujvrAnrJUHboF7LIFwWBmjYpCJGHPashCqwuL-xzToFH0hjfWKqRSDdYHSVe2FPAZ1PZ4HA_fhZYmzjXopKCn1_xaPU5JZnJKTjh3SWbuqATmI9ZAc9zQDh2TQeeOO3neS0Q9nhM9qCmExn0NOCnS_1UWbDcWpncCw6avFbmSaNgC7TpZzslo8fzwt824eQu5LXTS591xLz8FRYuSAvGXW2ypwZYGGBSuFY8oBv2Ol89aBa_qptgUed3OhHOTlC3JYb-p4SaiL0irHJm6qHPdhYmVQqEXnLBRgonIZGe8hMp-t7IWBcgGRND0kMzJH-H5eQa3q9AAsaDoLmr8smJE7BN-gRzVb-KTuYgCsFLWpzAzPeiUwuyIjo719TOdqOwMEKI0ZLfnVf6zmmhyVOOI3NWaPyGGz_Yo3wDsad5t-sW8uXdLW priority: 102 providerName: Directory of Open Access Journals |
Title | An SSI-Based Solution to Support Lawful Interception |
URI | https://www.proquest.com/docview/3170857524 https://doaj.org/article/2656a6ee8312433b9a3ddf1a67967d92 |
Volume | 15 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: KQ8 dateStart: 20110101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: ADMLS dateStart: 20120901 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: 8FG dateStart: 20110101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTxsxEB5RuNBDxaNVQyHyAQl6sMjaXsd7qhJEQAgQQiBxs_za3hJIlv_fGceBXMp1dw-7s56Zb17fABy3CGHrUBvuGjPgKtUV90pH3ui2DgldqmhpOPn2Tl89qevn-rkk3BalrXJlE7OhjrNAOfIz9HN5m6RQf15eOW2NoupqWaHxBbYqgSeJJsUnl-85FuK8NNVgOZYnMbqnqjAiICUEbThac0SZr_9_Vjm7mskOfCsYkY2WP3UXNtJ0D76uMQfuwW7RyQU7LcTRv_dBjaYMjSMfo2eKbJXwYt2M0e5OxNnsxlFPMstpwNLP8h2eJheP51e8bEXgQTRVx0NQjQ4K1SUlhfJ30gXXRmUcgrHodO2l8YjypPDBeVTQMGxcRUVvVRuP3vkHbE5n0_QTmE_aGS8Hfmi8CnHgdDTESOcdhmF163twvBKRfVmSX1gMGkiSdk2SPRiT-N4fIcbqfGE2_2uLAliBwNHplIxERCGlb5yMsa0c5bGGsRE9OCHhW9Krbo6fVMYD8E2JocqOqOKrEd9VPThc_R9bFG5hP47Hwee3f8G2oBW-ufH6EDa7-Vs6QlzR-X4-PH3YGl_c3T_0c3T-DynkzXQ |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB4hONAeqkJbdVsePoCgB6uJ7XidA0LLY1nKwgkkbq5f6W2X7qaq-qf6G5nJJrCX9sY1ycEZj2c-z-sD2KsQwhahMNyVJuMqFTn3Skde6qoICV2qqKg5-fpGj-7Ut_vifgX-dr0wVFbZ2cTGUMdpoBj5V_RzDZukUMcPPzmxRlF2taPQWKjFVfrzG69s86PLM9zffSGG57enI96yCvAgyrzmIahSB4XqlpLC9TvpgquiMg7BTHS68NJ4RElS-OA8Knjoly6npLEqjDfEEoEmf01JKWlWvxlePMV0aMamybNFG6CUZUZZaERcSghiVFpyfA0_wL-8QOPahm_hTYtJ2WChRBuwkiab8HppUuEmbLQ2YM4O20HVX96BGkwYGmN-gp4wsi7AxuopI65QxPVs7KgGmjVhx7Z-5j3cvYi8PsDqZDpJH4H5pJ3xMvN941WImdPR0AQ87_DaV1S-B3udiOzDYtiGxUsKSdIuSbIHJyS-p09oQnbzYDr7YdsDZwUCVadTMhIRjJS-dDLGKncUN-vHUvTggIRv6RzXM_ylth0BV0oTseyAMswa8WTeg61uf2x7wOf2WR0__f_1LqyPbq_Hdnx5c_UZXgmiD26KvrdgtZ79StuIaWq_0ygSg-8vrbmPoTEIdA |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LbxMxEB5VqYTggGgBESjgQxFwsLprex3voUIJbdTSElWISr0Zv7a3pCSLEH-RX8XMxltygVuvu3tYj8czn-f1Aew3CGGrUBnualNwlaqSe6Ujr3VThYQuVTTUnPx5pk8u1aer6moLfve9MFRW2dvEzlDHRaAY-QH6uY5NUqiDJpdFXBxNP9x858QgRZnWnk7DZZqFeNiNG8tNHmfp10-8zq0OT49w798IMT3--vGEZ8YBHkRdtjwEVeugUBVTUrg2J11wTVTGIdCJTldeGo8ISgofnEflD6PalZRQVpXxhhgk0B1sj6hfdADbk-PZxZfbiA9N4DRlsW4SlLIuKEeNeEwJQXxLG26xYw_4l4_oHN_0ETzMiJWN1yq2A1tpvgsPNuYY7sJOthAr9i6PsX7_GNR4ztBU8wn6ycj68BtrF4yYRBH1s3NHFdKsC0rm6poncHknEnsKg_linp4B80k742XhR8arEAuno6H5eN7hpbBq_BD2exHZm_UoDotXGJKk3ZDkECYkvttPaH5292CxvLb5OFqBMNbplIxEfCOlr52MsSkdRdVGsRZDeEvCt3TK2yUuKTcr4J_SvCw7pvyzRvUqh7DX74_Nx39l_yrr8_-_fg33UIvt-ens7AXcF8Qt3FWE78GgXf5ILxHwtP5V1iQG3-5aef8ArN0TTg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+SSI-Based+Solution+to+Support+Lawful+Interception&rft.jtitle=Applied+sciences&rft.au=Buccafurri%2C+Francesco&rft.au=Canino%2C+Aurelio+Loris&rft.au=De+Angelis%2C+Vincenzo&rft.au=Laurenda%2C+Annunziata&rft.date=2025-02-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=15&rft.issue=4&rft.spage=2206&rft_id=info:doi/10.3390%2Fapp15042206&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app15042206 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |