Role-based access control in telecommunication service management - dynamic role creation and management in TINA service environment

被引:0
|
作者
Fujitsu Lab of America, Sunnyvale, CA, United States [1 ]
机构
关键词
Algebra - Computer architecture - Data privacy - Data structures - Hierarchical systems - Information management - Information theory - Telecommunication networks - Telecommunication services - Video on demand;
D O I
暂无
中图分类号
学科分类号
摘要
Security issues in telecommunication service management in Telecommunication Information Network Architecture (TINA) service environment is studied by using billing and Video on Demand (VoD) service session examples. Role-based access control is extended to address the needs of telecommunication service management. Security space represents session participant's security interests, and is a useful concept to describe separation of security interests in service session. To address the security issues of service composition and federation, algebraic role specification, strongly-roled system, and role mapping are studied.
引用
收藏
相关论文
共 50 条
  • [31] Role-based access control for grid database services using the community authorization service
    Pereira, AL
    Muppavarapu, V
    Chung, SM
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (02) : 156 - 166
  • [32] A logical approach to dynamic role-based access control
    Balbiani, Philippe
    Chevalier, Yannick
    El Houri, Marwa
    ARTIFICIAL INTELLIGENCE: METHODOLOGY, SYSTEMS, AND APPLICATIONS, 2008, 5253 : 194 - 208
  • [33] An application of directory service markup language (DSML) for role-based access control (RBAC)
    Shin, DW
    Ahn, GJ
    Park, JS
    26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 934 - 939
  • [34] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [35] Support for Dynamic Service Composition with Role-Based Interaction Model
    贺小箭
    尤晋元
    唐新怀
    贾兆庆
    Journal of Shanghai Jiaotong University(Science), 2006, (01) : 56 - 59
  • [36] Support for dynamic service composition with role-based interaction model
    Dept. of Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China
    J. Shanghai Jiaotong Univ. Sci., 2006, 1 (56-59):
  • [37] The Implementation of Rights Management of Network Teaching Platform with Role-Based Access Control
    Han, Guiying
    Li, Xizuo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1603 - +
  • [38] A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
    ZHANG Shaomin~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1827 - 1830
  • [39] The application research of role-based access control model in workflow management system
    Wang, BY
    Zhang, SM
    Xia, XD
    GRID AND COOPERATIVE COMPUTING, PT 2, 2004, 3033 : 1034 - 1037
  • [40] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44