DocumentCode :
599360
Title :
Security management mechanism for composite applications based on hash chains
Author :
Limin Fan
Author_Institution :
Sch. of Autom., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2012
fDate :
10-12 Dec. 2012
Firstpage :
575
Lastpage :
577
Abstract :
With the opening up of telecom network resources to third parties, more and more value-added composite applications are developed and deployed. Security management for these composite applications becomes a practical and important issue. This paper presents a new security management mechanism based on hash chains. The new mechanism can provide real time authentication/authorization, real time execution process management, and real time charging validation for composite applications at the same time. In addition the new mechanism is very simple and efficient.
Keywords :
authorisation; cryptography; next generation networks; telecommunication security; authentication; authorization; composite application; hash chain; next generation network; realtime charging validation; realtime execution process management; security management mechanism; telecom network resource; Authentication; Protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology And Secured Transactions, 2012 International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4673-5325-0
Type :
conf
Filename :
6470877
Link To Document :
بازگشت