{"id":344137,"date":"2024-10-20T00:09:57","date_gmt":"2024-10-20T00:09:57","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-15-30326601-dc\/"},"modified":"2024-10-25T23:30:54","modified_gmt":"2024-10-25T23:30:54","slug":"bsi-15-30326601-dc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-15-30326601-dc\/","title":{"rendered":"BSI 15\/30326601 DC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
14<\/td>\n | 1 Overview and Scope 1.1 Introduction 2 Normative references <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3 Terms, definitions and abbreviated terms 3.1.1 3.1.2 3.1.3 3.2.1 3.3.1 <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 3.3.2 3.3.3 3.3.4 3.3.5 3.3.6 3.3.7 3.3.8 <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3.4.1 CaMS 4 Text conventionsNotation 5 Security Policies 5.1 Access Control and User Roles <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2 General Policies 5.3 Security Policies for Telephony Services 5.3.1 CallManagement:1 <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.3.2 MediaManagement:1 5.3.3 Messaging:1 <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.3.4 InputConfig:1 5.3.5 ConfigurationManagement:1 <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6 Call Monopolization using DeviceProtection 6.1 TelCP-Level Call Monopolization <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.1.1 Incoming Call Handling (TelCP-Level) <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.2 User-Level Call Monopolization <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.2.1 Incoming Call Handling (User-Level) <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.3 Secure PHONE-based Call Monopolization 7 Secure Media Sessions 7.1 Secure A\/V Call Session between TS and TC <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8 Secure Input Sessions <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex A (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" BS ISO\/IEC 29341-25-2. Information technology. UPnP Device Architecture. Part 25-2. Telephony device control protocol. Telephony security best practice<\/b><\/p>\n |