An SSI-Based Solution to Support Lawful Interception

Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In th...

Full description

Saved in:
Bibliographic Details
Published inApplied sciences Vol. 15; no. 4; p. 2206
Main Authors Buccafurri, Francesco, Canino, Aurelio Loris, De Angelis, Vincenzo, Laurenda, Annunziata, Lax, Gianluca
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.02.2025
Subjects
Online AccessGet full text
ISSN2076-3417
2076-3417
DOI10.3390/app15042206

Cover

Abstract Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the literature, standards and scientific solutions are proposed for the interception procedure and the interaction between the NO and the LEMF. However, no standard has been proposed for the interaction between the LEMF and the LEA. The absence of standards for controlling LEA (or a delegated agency) access to intercepted contents stored by the LEMF is a significant gap that should be overcome. This prevents the implementation of secure, interoperable, and automated procedures, leading to inefficiencies and security risks. In this paper, we propose to cover the above gap by adopting the Self-Sovereign Identity (SSI) paradigm. The adopted research methodology follows a multi-phase approach that includes studying existing solutions, system design, and technical feasibility testing. The study first examines existing standards and identity management frameworks and their limitations. Next, an SSI-based architecture is proposed to manage the interactions between LEA (or a delegated agency) and LEMF. Finally, a proof of concept of the proposed solution written in Python and using the Hyperledger Indy blockchain has been implemented to assess whether our proposal is technically feasible. The proposed solution enhances automation, security, and interoperability in lawful interception. Indeed, it enables machine-readable authorizations, reducing errors and improving efficiency by eliminating manual operations. Additionally, verifiable credentials and decentralized identifiers strengthen security and standardize interactions across jurisdictions, ensuring privacy-preserving identity management. By standardizing interactions between LEA and LEMF, this research contributes to a more secure, privacy-preserving, and legally compliant lawful interception process.
AbstractList Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the literature, standards and scientific solutions are proposed for the interception procedure and the interaction between the NO and the LEMF. However, no standard has been proposed for the interaction between the LEMF and the LEA. The absence of standards for controlling LEA (or a delegated agency) access to intercepted contents stored by the LEMF is a significant gap that should be overcome. This prevents the implementation of secure, interoperable, and automated procedures, leading to inefficiencies and security risks. In this paper, we propose to cover the above gap by adopting the Self-Sovereign Identity (SSI) paradigm. The adopted research methodology follows a multi-phase approach that includes studying existing solutions, system design, and technical feasibility testing. The study first examines existing standards and identity management frameworks and their limitations. Next, an SSI-based architecture is proposed to manage the interactions between LEA (or a delegated agency) and LEMF. Finally, a proof of concept of the proposed solution written in Python and using the Hyperledger Indy blockchain has been implemented to assess whether our proposal is technically feasible. The proposed solution enhances automation, security, and interoperability in lawful interception. Indeed, it enables machine-readable authorizations, reducing errors and improving efficiency by eliminating manual operations. Additionally, verifiable credentials and decentralized identifiers strengthen security and standardize interactions across jurisdictions, ensuring privacy-preserving identity management. By standardizing interactions between LEA and LEMF, this research contributes to a more secure, privacy-preserving, and legally compliant lawful interception process.
Audience Academic
Author Canino, Aurelio Loris
Lax, Gianluca
Buccafurri, Francesco
Laurenda, Annunziata
De Angelis, Vincenzo
Author_xml – sequence: 1
  givenname: Francesco
  orcidid: 0000-0003-0448-8464
  surname: Buccafurri
  fullname: Buccafurri, Francesco
– sequence: 2
  givenname: Aurelio Loris
  surname: Canino
  fullname: Canino, Aurelio Loris
– sequence: 3
  givenname: Vincenzo
  orcidid: 0000-0001-9731-3641
  surname: De Angelis
  fullname: De Angelis, Vincenzo
– sequence: 4
  givenname: Annunziata
  surname: Laurenda
  fullname: Laurenda, Annunziata
– sequence: 5
  givenname: Gianluca
  orcidid: 0000-0002-5226-0870
  surname: Lax
  fullname: Lax, Gianluca
BookMark eNpNUU1Lw0AQXaSCtfbkHwh4lNT9zu6xFj8CBQ_R8zLZbEpKmo2bBPHfu7UincsMb-Y9HvOu0azznUPoluAVYxo_QN8TgTmlWF6gOcWZTBkn2exsvkLLYdjjWJowRfAc8XWXFEWePsLgqqTw7TQ2vktGnxRT3_swJlv4qqc2ybvRBev64_oGXdbQDm751xfo4_npffOabt9e8s16m1qqyZhay7W0vMTYOW4tAAMLdcUVCKIrkKJkqhQ4Y7S0UGKubKaBUEwwF6pUgi1QftKtPOxNH5oDhG_joTG_gA87A2FsbOsMlUKCdE4xQjljpQZWVTUBmWmZVZpGrbuTVh_85-SG0ez9FLpo3zCSYSUyEYkLtDpd7SCKNl3txxBNW6jcobHx33UT8bWiGkshCImE-xPBBj8MwdX_Ngk2x1jMWSzsB4P4fnM
Cites_doi 10.1016/j.clsr.2023.105867
10.1109/ACCESS.2021.3131012
10.1016/j.aeue.2007.08.006
10.1109/ACCESS.2020.3034299
10.1007/978-3-319-74872-6_5
10.1007/978-3-030-29053-5
10.1109/LCN52139.2021.9525011
10.1016/j.dsm.2024.04.003
10.1109/BESC51023.2020.9348298
10.1365/s43439-022-00074-7
10.1145/3277570.3277578
10.1109/ICIMP.2007.27
10.3390/app14010139
10.1145/3477314.3507202
10.1007/s12599-023-00830-x
10.1109/NCA.2019.8935015
10.1007/978-3-030-86611-2_2
10.3390/fi14080243
10.3389/fbloc.2021.626726
10.1109/ICCWS53234.2021.9702980
10.1016/j.cose.2024.103771
10.17487/rfc3415
10.1109/ISSE49799.2020.9272223
10.1109/TrustCom/BigDataSE.2018.00195
10.1016/S1361-3723(07)70116-1
10.3390/fi13120301
10.1109/MCOMSTD.001.1900029
10.1109/ACCESS.2024.3357940
10.1016/j.ijinfomgt.2020.102136
10.1007/s11572-023-09704-5
10.1007/978-981-99-3935-0
10.1016/j.diin.2015.04.005
10.1109/ETFA.2019.8869262
10.1155/2021/8873429
10.1016/j.cosrev.2018.10.002
10.1109/ISNCC49221.2020.9297357
10.1155/2022/5429195
10.1016/j.arcontrol.2023.02.004
10.1016/j.telpol.2005.06.010
10.1007/978-3-030-75539-3_22
10.1016/j.matpr.2021.03.083
10.3389/fbloc.2024.1443362
10.3390/s22134714
10.1016/j.trc.2020.01.002
10.3390/s21020428
ContentType Journal Article
Copyright COPYRIGHT 2025 MDPI AG
2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2025 MDPI AG
– notice: 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/app15042206
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
ProQuest One
ProQuest Central
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database

CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: BENPR
  name: ProQuest Central
  url: http://www.proquest.com/pqcentral?accountid=15518
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_2656a6ee8312433b9a3ddf1a67967d92
A829065511
10_3390_app15042206
GeographicLocations United States
Germany
GeographicLocations_xml – name: Germany
– name: United States
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
PUEGO
TUS
PMFND
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c291t-cc496c4b00ee4ccaa3acafd48a519da65b38b50732bcab048c79a12010458b853
IEDL.DBID 8FG
ISSN 2076-3417
IngestDate Wed Aug 27 01:18:39 EDT 2025
Thu Jul 24 12:11:12 EDT 2025
Tue Jun 10 21:01:15 EDT 2025
Wed Oct 01 06:53:10 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-cc496c4b00ee4ccaa3acafd48a519da65b38b50732bcab048c79a12010458b853
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-0448-8464
0000-0002-5226-0870
0000-0001-9731-3641
OpenAccessLink https://www.proquest.com/docview/3170857524?pq-origsite=%requestingapplication%
PQID 3170857524
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_2656a6ee8312433b9a3ddf1a67967d92
proquest_journals_3170857524
gale_infotracacademiconefile_A829065511
crossref_primary_10_3390_app15042206
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2025-02-01
PublicationDateYYYYMMDD 2025-02-01
PublicationDate_xml – month: 02
  year: 2025
  text: 2025-02-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2025
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_50
Pleva (ref_65) 2012; 5
ref_58
ref_56
ref_10
Turanjanin (ref_11) 2023; 4
ref_53
ref_52
ref_51
Davie (ref_23) 2019; 3
ref_19
ref_17
ref_15
ref_59
Gayvoronskaya (ref_14) 2018; 30
Regueiro (ref_57) 2021; 9
Imperl (ref_70) 2008; 62
Omand (ref_3) 2024; 18
ref_25
ref_69
ref_24
ref_68
ref_67
Gorge (ref_12) 2007; 2007
Khovratovich (ref_18) 2017; 17
ref_66
ref_21
ref_20
Helliar (ref_27) 2020; 54
ref_64
ref_63
ref_62
ref_29
ref_28
Alamillo (ref_72) 2021; 2
Aparicio (ref_71) 2015; 14
Tobin (ref_13) 2016; 29
Farooq (ref_46) 2020; 111
ref_36
ref_33
Guhl (ref_7) 2008; 17
ref_32
Voigt (ref_37) 2017; Volume 10
ref_31
ref_30
Bartolomeu (ref_47) 2020; 8
Li (ref_4) 2023; 55
Buccafurri (ref_16) 2024; 140
Doronin (ref_1) 2023; 51
Soltani (ref_35) 2021; 2021
ref_39
Sedlmeir (ref_34) 2024; 66
ref_38
Satybaldy (ref_22) 2024; 12
Bronitt (ref_60) 2005; 29
Abelson (ref_61) 2015; 1
ref_45
ref_44
ref_43
ref_42
Ren (ref_26) 2022; 2022
ref_41
ref_40
Shuaib (ref_55) 2023; 81
ref_2
Ling (ref_54) 2024; 7
ref_49
ref_48
ref_9
ref_8
ref_5
ref_6
References_xml – ident: ref_9
– ident: ref_32
– volume: 51
  start-page: 105867
  year: 2023
  ident: ref_1
  article-title: “Lawful interception–A market access barrier in the European Union”?
  publication-title: Comput. Law Secur. Rev.
  doi: 10.1016/j.clsr.2023.105867
– ident: ref_68
– volume: 9
  start-page: 159965
  year: 2021
  ident: ref_57
  article-title: Enabling identity for the IoT-as-a-service business model
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3131012
– volume: 62
  start-page: 610
  year: 2008
  ident: ref_70
  article-title: Border gateway function performance requirements for the lawful intercept of voice at IMS architecture
  publication-title: AEU-Int. J. Electron. Commun.
  doi: 10.1016/j.aeue.2007.08.006
– volume: 8
  start-page: 196212
  year: 2020
  ident: ref_47
  article-title: Pay as You Go: A Generic Crypto Tolling Architecture
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3034299
– ident: ref_39
– ident: ref_64
  doi: 10.1007/978-3-319-74872-6_5
– ident: ref_63
  doi: 10.1007/978-3-030-29053-5
– ident: ref_41
  doi: 10.1109/LCN52139.2021.9525011
– volume: 7
  start-page: 304
  year: 2024
  ident: ref_54
  article-title: Trust Framework for Self-Sovereign ID in Metaverse Health Care Applications
  publication-title: Data Sci. Manag.
  doi: 10.1016/j.dsm.2024.04.003
– volume: 2
  start-page: 89
  year: 2021
  ident: ref_72
  article-title: Self-Sovereign-Identity & eIDAS: A Contradiction? Challenges and Chances of [eIDAS2]
  publication-title: Eur. Rev. Digit. Adm. Law
– volume: 29
  start-page: 18
  year: 2016
  ident: ref_13
  article-title: The inevitable rise of self-sovereign identity
  publication-title: Sovrin Found.
– ident: ref_38
  doi: 10.1109/BESC51023.2020.9348298
– volume: 4
  start-page: 115
  year: 2023
  ident: ref_11
  article-title: When does bulk interception of communications violate the right to privacy? The limits of the state’s power and the European Court of Human Rights Approach
  publication-title: Int. Cybersecur. Law Rev.
  doi: 10.1365/s43439-022-00074-7
– volume: 17
  start-page: 38
  year: 2017
  ident: ref_18
  article-title: Sovrin: Digital identities in the blockchain era
  publication-title: Github Commit Jasonalaw Oct.
– ident: ref_6
  doi: 10.1145/3277570.3277578
– ident: ref_69
  doi: 10.1109/ICIMP.2007.27
– ident: ref_8
– ident: ref_15
  doi: 10.3390/app14010139
– volume: 17
  start-page: 110
  year: 2008
  ident: ref_7
  article-title: The Communications Assistance for Law Enforcement Act (CALEA)
  publication-title: Inf. Secur. Journal: Glob. Perspect.
– ident: ref_52
– ident: ref_5
  doi: 10.1145/3477314.3507202
– volume: 66
  start-page: 421
  year: 2024
  ident: ref_34
  article-title: A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity
  publication-title: Bus. Inf. Syst. Eng.
  doi: 10.1007/s12599-023-00830-x
– ident: ref_42
  doi: 10.1109/NCA.2019.8935015
– ident: ref_48
– ident: ref_10
– ident: ref_66
  doi: 10.1007/978-3-030-86611-2_2
– ident: ref_25
  doi: 10.3390/fi14080243
– ident: ref_44
  doi: 10.3389/fbloc.2021.626726
– ident: ref_49
  doi: 10.1109/ICCWS53234.2021.9702980
– ident: ref_62
– ident: ref_17
– ident: ref_45
– volume: 140
  start-page: 103771
  year: 2024
  ident: ref_16
  article-title: Enforcing security policies on interacting authentication systems
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2024.103771
– ident: ref_20
  doi: 10.17487/rfc3415
– ident: ref_40
  doi: 10.1109/ISSE49799.2020.9272223
– ident: ref_51
  doi: 10.1109/TrustCom/BigDataSE.2018.00195
– volume: 2007
  start-page: 10
  year: 2007
  ident: ref_12
  article-title: Lawful interception – key concepts, actors, trends and best practice considerations
  publication-title: Comput. Fraud. Secur.
  doi: 10.1016/S1361-3723(07)70116-1
– ident: ref_28
– ident: ref_53
– ident: ref_59
  doi: 10.3390/fi13120301
– volume: 3
  start-page: 46
  year: 2019
  ident: ref_23
  article-title: The trust over ip stack
  publication-title: IEEE Commun. Stand. Mag.
  doi: 10.1109/MCOMSTD.001.1900029
– ident: ref_30
– volume: 12
  start-page: 16151
  year: 2024
  ident: ref_22
  article-title: A taxonomy of challenges for self-sovereign identity systems
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2024.3357940
– volume: 54
  start-page: 102136
  year: 2020
  ident: ref_27
  article-title: Permissionless and permissioned blockchain diffusion
  publication-title: Int. J. Inf. Manag.
  doi: 10.1016/j.ijinfomgt.2020.102136
– ident: ref_24
– volume: 18
  start-page: 805
  year: 2024
  ident: ref_3
  article-title: Examining the Ethics of Spying: A Practitioner’s View
  publication-title: Crim. Law Philos.
  doi: 10.1007/s11572-023-09704-5
– ident: ref_2
  doi: 10.1007/978-981-99-3935-0
– volume: 14
  start-page: 1
  year: 2015
  ident: ref_71
  article-title: Digital Wiretap Warrant: Improving the security of ETSI Lawful Interception
  publication-title: Digit. Investig.
  doi: 10.1016/j.diin.2015.04.005
– ident: ref_58
  doi: 10.1109/ETFA.2019.8869262
– volume: 2021
  start-page: 8873429
  year: 2021
  ident: ref_35
  article-title: A Survey of Self-Sovereign Identity Ecosystem
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2021/8873429
– volume: 30
  start-page: 80
  year: 2018
  ident: ref_14
  article-title: A survey on essential components of a self-sovereign identity
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2018.10.002
– ident: ref_31
  doi: 10.1109/ISNCC49221.2020.9297357
– volume: 2022
  start-page: 5429195
  year: 2022
  ident: ref_26
  article-title: Cryptographic accumulator and its application: A survey
  publication-title: Secur. Commun. Netw.
  doi: 10.1155/2022/5429195
– volume: 5
  start-page: 191
  year: 2012
  ident: ref_65
  article-title: Voice Quality Measuring Setup with Automatic Voice over IP Call Generator and Lawful Interception Packet Analyzer
  publication-title: J. Electr. Electron. Eng.
– volume: 55
  start-page: 237
  year: 2023
  ident: ref_4
  article-title: A critical review of cyber-physical security for building automation systems
  publication-title: Annu. Rev. Control
  doi: 10.1016/j.arcontrol.2023.02.004
– ident: ref_21
– volume: Volume 10
  start-page: 10
  year: 2017
  ident: ref_37
  article-title: The eu general data protection regulation (gdpr)
  publication-title: A Practical Guide
– volume: 1
  start-page: 69
  year: 2015
  ident: ref_61
  article-title: Keys under doormats: Mandating insecurity by requiring government access to all data and communications
  publication-title: J. Cybersecur.
– ident: ref_29
– ident: ref_33
– volume: 29
  start-page: 875
  year: 2005
  ident: ref_60
  article-title: Telecommunications interception in Australia: Recent trends and regulatory prospects
  publication-title: Telecommun. Policy
  doi: 10.1016/j.telpol.2005.06.010
– ident: ref_50
  doi: 10.1007/978-3-030-75539-3_22
– volume: 81
  start-page: 203
  year: 2023
  ident: ref_55
  article-title: Self-sovereign identity for healthcare using blockchain
  publication-title: Mater. Today Proc.
  doi: 10.1016/j.matpr.2021.03.083
– ident: ref_36
– ident: ref_43
  doi: 10.3389/fbloc.2024.1443362
– ident: ref_56
  doi: 10.3390/s22134714
– ident: ref_19
– volume: 111
  start-page: 588
  year: 2020
  ident: ref_46
  article-title: A multi-layered blockchain framework for smart mobility data-markets
  publication-title: Transp. Res. Part C Emerg. Technol.
  doi: 10.1016/j.trc.2020.01.002
– ident: ref_67
  doi: 10.3390/s21020428
SSID ssj0000913810
Score 2.312339
Snippet Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Index Database
StartPage 2206
SubjectTerms Access control
Actors
Actresses
Automation
Blockchain
Communication
Data integrity
ETSI
Hyperledge
Interfaces
Interoperability
Law enforcement
Laws, regulations and rules
Privacy
Public Key Infrastructure
Security management
Self-Sovereign Identity
Sovrin
Trinsic
User behavior
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELUQEwyIFhCBgjxUAoaIJv6oPbaIqkLARKVulr8ypqgN_587J0VZEAtrlMF5l7t7Z5_fETKugMIKL1RutZrkPIoid1yGXMtK-AgptazwcvLbu1yu-MtarHujvrAnrJUHboF7LIFwWBmjYpCJGHPashCqwuL-xzToFH0hjfWKqRSDdYHSVe2FPAZ1PZ4HA_fhZYmzjXopKCn1_xaPU5JZnJKTjh3SWbuqATmI9ZAc9zQDh2TQeeOO3neS0Q9nhM9qCmExn0NOCnS_1UWbDcWpncCw6avFbmSaNgC7TpZzslo8fzwt824eQu5LXTS591xLz8FRYuSAvGXW2ypwZYGGBSuFY8oBv2Ol89aBa_qptgUed3OhHOTlC3JYb-p4SaiL0irHJm6qHPdhYmVQqEXnLBRgonIZGe8hMp-t7IWBcgGRND0kMzJH-H5eQa3q9AAsaDoLmr8smJE7BN-gRzVb-KTuYgCsFLWpzAzPeiUwuyIjo719TOdqOwMEKI0ZLfnVf6zmmhyVOOI3NWaPyGGz_Yo3wDsad5t-sW8uXdLW
  priority: 102
  providerName: Directory of Open Access Journals
Title An SSI-Based Solution to Support Lawful Interception
URI https://www.proquest.com/docview/3170857524
https://doaj.org/article/2656a6ee8312433b9a3ddf1a67967d92
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: KQ8
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  providerName: Colorado Alliance of Research Libraries
– providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVEBS
  databaseName: Inspec with Full Text
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: ADMLS
  dateStart: 20120901
  isFulltext: true
  titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text
  providerName: EBSCOhost
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: 8FG
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LTxsxEB5RuNBDxaNVQyHyAQl6sMjaXsd7qhJEQAgQQiBxs_za3hJIlv_fGceBXMp1dw-7s56Zb17fABy3CGHrUBvuGjPgKtUV90pH3ui2DgldqmhpOPn2Tl89qevn-rkk3BalrXJlE7OhjrNAOfIz9HN5m6RQf15eOW2NoupqWaHxBbYqgSeJJsUnl-85FuK8NNVgOZYnMbqnqjAiICUEbThac0SZr_9_Vjm7mskOfCsYkY2WP3UXNtJ0D76uMQfuwW7RyQU7LcTRv_dBjaYMjSMfo2eKbJXwYt2M0e5OxNnsxlFPMstpwNLP8h2eJheP51e8bEXgQTRVx0NQjQ4K1SUlhfJ30gXXRmUcgrHodO2l8YjypPDBeVTQMGxcRUVvVRuP3vkHbE5n0_QTmE_aGS8Hfmi8CnHgdDTESOcdhmF163twvBKRfVmSX1gMGkiSdk2SPRiT-N4fIcbqfGE2_2uLAliBwNHplIxERCGlb5yMsa0c5bGGsRE9OCHhW9Krbo6fVMYD8E2JocqOqOKrEd9VPThc_R9bFG5hP47Hwee3f8G2oBW-ufH6EDa7-Vs6QlzR-X4-PH3YGl_c3T_0c3T-DynkzXQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB4hONAeqkJbdVsePoCgB6uJ7XidA0LLY1nKwgkkbq5f6W2X7qaq-qf6G5nJJrCX9sY1ycEZj2c-z-sD2KsQwhahMNyVJuMqFTn3Skde6qoICV2qqKg5-fpGj-7Ut_vifgX-dr0wVFbZ2cTGUMdpoBj5V_RzDZukUMcPPzmxRlF2taPQWKjFVfrzG69s86PLM9zffSGG57enI96yCvAgyrzmIahSB4XqlpLC9TvpgquiMg7BTHS68NJ4RElS-OA8Knjoly6npLEqjDfEEoEmf01JKWlWvxlePMV0aMamybNFG6CUZUZZaERcSghiVFpyfA0_wL-8QOPahm_hTYtJ2WChRBuwkiab8HppUuEmbLQ2YM4O20HVX96BGkwYGmN-gp4wsi7AxuopI65QxPVs7KgGmjVhx7Z-5j3cvYi8PsDqZDpJH4H5pJ3xMvN941WImdPR0AQ87_DaV1S-B3udiOzDYtiGxUsKSdIuSbIHJyS-p09oQnbzYDr7YdsDZwUCVadTMhIRjJS-dDLGKncUN-vHUvTggIRv6RzXM_ylth0BV0oTseyAMswa8WTeg61uf2x7wOf2WR0__f_1LqyPbq_Hdnx5c_UZXgmiD26KvrdgtZ79StuIaWq_0ygSg-8vrbmPoTEIdA
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LbxMxEB5VqYTggGgBESjgQxFwsLprex3voUIJbdTSElWISr0Zv7a3pCSLEH-RX8XMxltygVuvu3tYj8czn-f1Aew3CGGrUBnualNwlaqSe6Ujr3VThYQuVTTUnPx5pk8u1aer6moLfve9MFRW2dvEzlDHRaAY-QH6uY5NUqiDJpdFXBxNP9x858QgRZnWnk7DZZqFeNiNG8tNHmfp10-8zq0OT49w798IMT3--vGEZ8YBHkRdtjwEVeugUBVTUrg2J11wTVTGIdCJTldeGo8ISgofnEflD6PalZRQVpXxhhgk0B1sj6hfdADbk-PZxZfbiA9N4DRlsW4SlLIuKEeNeEwJQXxLG26xYw_4l4_oHN_0ETzMiJWN1yq2A1tpvgsPNuYY7sJOthAr9i6PsX7_GNR4ztBU8wn6ycj68BtrF4yYRBH1s3NHFdKsC0rm6poncHknEnsKg_linp4B80k742XhR8arEAuno6H5eN7hpbBq_BD2exHZm_UoDotXGJKk3ZDkECYkvttPaH5292CxvLb5OFqBMNbplIxEfCOlr52MsSkdRdVGsRZDeEvCt3TK2yUuKTcr4J_SvCw7pvyzRvUqh7DX74_Nx39l_yrr8_-_fg33UIvt-ens7AXcF8Qt3FWE78GgXf5ILxHwtP5V1iQG3-5aef8ArN0TTg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+SSI-Based+Solution+to+Support+Lawful+Interception&rft.jtitle=Applied+sciences&rft.au=Buccafurri%2C+Francesco&rft.au=Canino%2C+Aurelio+Loris&rft.au=De+Angelis%2C+Vincenzo&rft.au=Laurenda%2C+Annunziata&rft.date=2025-02-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=15&rft.issue=4&rft.spage=2206&rft_id=info:doi/10.3390%2Fapp15042206&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app15042206
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon