ARTICLE
TITLE

Secure Data Retention of Call Detail Records

SUMMARY

In today’s world communication is relying heavily on electronic means, both for voice and other native data. All these communication sessions leave behind journaling information by the very nature of the underlying services. This information is both sensitive with respect to user’s rights and important for law enforcement purposes, so proper storage and retrieval techniques have to be taken into consideration. The paper discusses such techniques in relation with recent EU recommendations and suggests some methods for achieving good performance while preserving the required security levels.

 Articles related

Sahana, Thejashwini, Vagdevi Kamath, Yaparla Lahari, Kusuma Mohanchandra    

The potential for blockchain technology in the healthcare sector is summarize in this study. It covers a wide range of technology themes, including storing medical information in blockchains, patient personal data ownership, and patient outreach via mobi... see more


Munirul Ula    

Saat ini layanan public cloud computing sudah menjadi bagian dari system informasi yang lumrah digunakan pada perusahaan modern. Hal ini dipicu oleh biaya yang relative murah, reliable dan effisien. Akan tetapi cloud computing memiliki banyak masalah kea... see more


Aditya Puji Nugroho,Arini Arini,Hendra Bayu Suseno    

The Malacca waste bank located in East Jakarta was established in 2008, the Malacca waste bank has a number of customers reaching more than 300 people and the waste absorbed every month reaches 2 - 2.5 tons. In carrying out its activities, the Malacca Sa... see more


Rohit Singh,Himadri Nath Saha,Debika Bhattacharyya,Pranab Kumar Banerjee    

The proliferation of mobile computing and communication devices are driving a revolutionary change in our information society. Among all the applications and services run by mobile devices, network connections and corresponding data services are without ... see more


Michael Sitorus, Deki Satria    

Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information. The threat of security to information such as interruption, interception, modificat... see more