DocumentCode
599360
Title
Security management mechanism for composite applications based on hash chains
Author
Limin Fan
Author_Institution
Sch. of Autom., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear
2012
fDate
10-12 Dec. 2012
Firstpage
575
Lastpage
577
Abstract
With the opening up of telecom network resources to third parties, more and more value-added composite applications are developed and deployed. Security management for these composite applications becomes a practical and important issue. This paper presents a new security management mechanism based on hash chains. The new mechanism can provide real time authentication/authorization, real time execution process management, and real time charging validation for composite applications at the same time. In addition the new mechanism is very simple and efficient.
Keywords
authorisation; cryptography; next generation networks; telecommunication security; authentication; authorization; composite application; hash chain; next generation network; realtime charging validation; realtime execution process management; security management mechanism; telecom network resource; Authentication; Protocols;
fLanguage
English
Publisher
ieee
Conference_Titel
Internet Technology And Secured Transactions, 2012 International Conference for
Conference_Location
London
Print_ISBN
978-1-4673-5325-0
Type
conf
Filename
6470877
Link To Document