Role-based access control in telecommunication service management - dynamic role creation and management in TINA service environment

被引:0
|
作者
Fujitsu Lab of America, Sunnyvale, CA, United States [1 ]
机构
关键词
Algebra - Computer architecture - Data privacy - Data structures - Hierarchical systems - Information management - Information theory - Telecommunication networks - Telecommunication services - Video on demand;
D O I
暂无
中图分类号
学科分类号
摘要
Security issues in telecommunication service management in Telecommunication Information Network Architecture (TINA) service environment is studied by using billing and Video on Demand (VoD) service session examples. Role-based access control is extended to address the needs of telecommunication service management. Security space represents session participant's security interests, and is a useful concept to describe separation of security interests in service session. To address the security issues of service composition and federation, algebraic role specification, strongly-roled system, and role mapping are studied.
引用
收藏
相关论文
共 50 条
  • [1] Service session security in TINA - Dynamic role creation and management in TINA service environment
    Hamada, T
    SEVENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WET ICE '98), 1998, : 365 - 370
  • [2] Dynamic role creation from role class hierarchy - Security management of service session in dynamic service environment
    Hamada, T
    TINA '97 - GLOBAL CONVERGENCE OF TELECOMMUNICATIONS AND DISTRIBUTED OBJECT COMPUTING, PROCEEDINGS, 1998, : 152 - 163
  • [3] Service-oriented role-based access control
    Xu, Feng
    Lai, Hai-Guang
    Huang, Hao
    Xie, Li
    Jisuanji Xuebao/Chinese Journal of Computers, 2005, 28 (04): : 686 - 693
  • [4] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [5] Accounting Management based service environment in a TINA architecture
    Sekkaki, A
    Alvarez, LMC
    Watanabe, WT
    Westphall, CB
    2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, 2001, : 2094 - 2099
  • [6] Role-Based and Service-Oriented Security Management in the E-Government Environment
    Yu, Chien-Chih
    ELECTRONIC GOVERNMENT, PROCEEDINGS, 2009, 5693 : 364 - 375
  • [7] Toward role-based provisioning and access control for infrastructure as a service (IaaS)
    Shin, Dongwan
    Akkan, Hakan
    Claycomb, William
    Kim, Kwanjoong
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2011, 2 : 243 - 255
  • [8] Hierarchical Role-Based Access Control with Homomorphic Encryption for Database as a Service
    Hingwe, Kamlesh Kumar
    Bhanu, S. Mary Saira
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 437 - 448
  • [9] Grid Learning Management System with Role-Based Access Control
    Somasundaram, Thamarai Selvi
    Manimalar, PriyaaDharshini
    Kannan, G.
    Kumar, Vive
    Sidhan, Mohan
    FIRST INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING 2009 (ICAC 2009), 2009, : 167 - +
  • [10] Research and realization of the role-based system access control management
    Cai, Hong
    Chen, Rong-Yao
    Ling, Hu-Jia
    Journal of Donghua University (English Edition), 2010, 27 (02) : 267 - 269