• DocumentCode
    599360
  • Title

    Security management mechanism for composite applications based on hash chains

  • Author

    Limin Fan

  • Author_Institution
    Sch. of Autom., Beijing Univ. of Posts & Telecommun., Beijing, China
  • fYear
    2012
  • fDate
    10-12 Dec. 2012
  • Firstpage
    575
  • Lastpage
    577
  • Abstract
    With the opening up of telecom network resources to third parties, more and more value-added composite applications are developed and deployed. Security management for these composite applications becomes a practical and important issue. This paper presents a new security management mechanism based on hash chains. The new mechanism can provide real time authentication/authorization, real time execution process management, and real time charging validation for composite applications at the same time. In addition the new mechanism is very simple and efficient.
  • Keywords
    authorisation; cryptography; next generation networks; telecommunication security; authentication; authorization; composite application; hash chain; next generation network; realtime charging validation; realtime execution process management; security management mechanism; telecom network resource; Authentication; Protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Technology And Secured Transactions, 2012 International Conference for
  • Conference_Location
    London
  • Print_ISBN
    978-1-4673-5325-0
  • Type

    conf

  • Filename
    6470877