**6. References**


relations. How to abstract the sharing domain concepts and reasonably organize them is a big challenge. In this chapter, we presented a practical domain ontology modelling approach for telecommunications service field. Based on this approach, we constructed an open telecommunication service domain ontology repository to support the knowledge sharing and reuse. This will partly facilitate the semantic interoperability of the

This work was supported by National Key Basic Research Program of China (973 Program) under Grant No. 2012CB315802, National Natural Science Foundation of China under Grant No. 60802034, No. 61171102 and No. 61132001, Beijing Nova Program under Grant No. 2008B50 and New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No. 2011ZX03002-002-01. We thank Huawei Technologies Co., Ltd. for cooperation in promotion of this work. Thanks also to Dr. Anna Fensel, a Senior Researcher at FTW – Telecommunications Research Center Vienna and STI Innsbruck, University of Innsbruck, Austria, for her valuable comments and

Bashah, N.S.K., Jorstad, I. & Thanh, D.V. (2010). Service Discovery in Future Open Mobile

Borland, (2006). Together: Visual Modeling for Software Architecture Design. 26.09.2011,

BUPT, (2009). Semantic web application for telecommunications service. 26.09.2011, Available from http://www.int.bupt.cn/jsp/centers/bupt506/intro.htm Do, T.V., Jorstad, I. (2005). A service-oriented architecture framework for mobile services.

FOAF project, (2000). The Friend of a Friend (FOAF) project. 26.09.2011, Available from

Google, (2010). Google's Semantic Web Push: Rich Snippets Usage Growing. 26.09.2011,

http://www.readwriteweb.com/archives/google\_semantic\_web\_push\_rich\_snipp

Gutheim, P. (2011). An ontology-based context inference service for mobile applications in

IST SPICE project, (2008). 26.09.2011, Available from http://www.ist-spice.org/

next-generation networks. *IEEE Communications Magazine*, Vol. 49, No. 1, (Jan.

Available from http://www.borland.com/us/products/together/

FOAF, (2010). FOAF Vocabulary Specification. 26.09.2011, Available from

Environments. *Proceedings of ICDS 2010 Fourth International Conference on Digital Society,* pp.47-53, ISBN 978-1-4244-5805-9, St. Maarten, Netherlands Antilles,

*Proceedings of Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop AICT/SAPIR/ ELETE*, pp. 65 – 70, ISBN 0-7695-2388-9, Lisbon, Portugal,

telecommunications networks and the Internet in the service layer.

**5. Acknowledgment** 

suggestions.

**6. References** 

February 10-16, 2010

July 17-20, 2005

Available from

ets\_usage\_grow.php

http://xmlns.com/foaf/spec/

http://www.foaf-project.org/

2011), pp. 60 – 66, ISSN 0163-6804


**9** 

**Quantum Secure** 

*1National Aviation University* 

*named after O.S. Popov* 

*Ukraine* 

Michael Rabin

**Telecommunication Systems** 

Oleksandr Korchenko1, Petro Vorobiyenko2,

*2Odessa National Academy of Telecommunication* 

*Our scientific field is still in its embryonic stage. It's great that we haven't been around for two thousands years. We are still at a stage where very, very important results occur in front of our eyes* 

Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1

Today there is virtually no area where information technology (ІТ) is not used in some way. Computers support banking systems, control the work of nuclear power plants, and control aircraft, satellites and spacecraft. The high level of automation therefore depends on the

The main features of information security are confidentiality, integrity and availability. Only providing these all gives availability for development secure telecommunication systems. *Confidentiality* is the basic feature of information security, which ensures that information is accessible only to authorized users who have an access. *Integrity* is the basic feature of information security indicating its property to resist unauthorized modification. *Availability*  is the basic feature of information security that indicates accessible and usable upon demand

One of the most effective ways to ensure confidentiality and data integrity during transmission is cryptographic systems. The purpose of such systems is to provide key distribution, authentication, legitimate users authorisation, and encryption. *Key distribution is one of the most important problems of cryptography.* This problem can be solved with the help of (SECOQC White Paper on Quantum Key Distribution and Cryptography, 2007;

• *Classical information-theoretic schemes* (requires channel with noise; efficiency is very low,

• *Classical public-key cryptography schemes* (Diffie-Hellman scheme, digital envelope

**1. Introduction** 

security level of IT.

by an authorized entity.

Korchenko et al., 2010a):

scheme; it has computational security).

1–5%).

