On New Security Mechanisms for Identity Management: Recognizing and Meeting Telecom Operator and Enterprise Needs

被引:1
|
作者
Faynberg, Igor [1 ]
Hartman, Mark A. [2 ]
Lu, Hui-Lan [3 ]
Varney, Douglas W. [4 ]
机构
[1] Stevens Inst Technol, Dept Comp Sci, Hoboken, NJ 07030 USA
[2] Alcatel Lucent, ASG, Architecture Team, Raleigh, NC USA
[3] Bell Labs, Murray Hill, NJ 07974 USA
[4] Alcatel Lucent, Naperville, IL USA
关键词
D O I
10.1002/bltj.20426
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Initially created by the information technology industry, the identity management (IdM) concept has been increasingly recognized as a foundation for key new services by telecommunication network operators. Indeed, since telecom operators "own" wireless and wireline access, they also "own" a great deal of information about their subscribers. Based on those assets, telecom operators are in a unique position to offer a range of identity-based services from home networking to straightforward authentication services for enterprise, to a complex blend of services, including financial and medical transactions. Conversely, by federating data from multiple application providers, coupled with single sign-on (550), telecom operators can offer unique mash-up services. The technology underpinning the development of such services is centered on security (i.e., the interworking of a range of authentication, key exchange, and encryption mechanisms, along with appropriate policies). This paper addresses the trends in certain novel mechanisms published here for the first time-to fill in the present technology gaps. These trends are also active topics in standards bodies. (C) 2010 Alcatel-Lucent.
引用
收藏
页码:95 / 113
页数:19
相关论文
共 7 条
  • [1] Single Point Security. Meeting the Needs of Enterprise-Level Security and User Productivity
    Taglieri, R.
    Unisphere, 1600, 16 (04):
  • [2] Identity mapping -: An approach to unravel enterprise security management policies
    Essmayr, W
    Weippl, E
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 79 - 88
  • [3] Recognizing the needs for improving the portfolio management for new products in the industry
    Larsson, F
    Mortensen, NH
    Andreasen, MM
    Design 2004: Proceedings of the 8th International Design Conference, Vols 1-3, 2004, : 337 - 342
  • [4] Can we tune information security management into meeting corporate governance needs?: (invited paper)
    Yngström, L
    SECURITY MANAGEMENT, INTEGRITY, AND INTERNAL CONTROL IN INFORMATION SYSTEMS, 2005, 193 : 237 - 245
  • [5] Changing fuel management strategies - The challenge of meeting new information and analysis needs
    Conard, SG
    Hartzell, T
    Hilbruner, MW
    Zimmerman, GT
    INTERNATIONAL JOURNAL OF WILDLAND FIRE, 2001, 10 (3-4) : 267 - 275
  • [6] Removing Escrow from Identity-Based Encryption New Security Notions and Key Management Techniques
    Chow, Sherman S. M.
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 256 - 276
  • [7] Design and formal security evaluation of NeMHIP: A new secure and efficient network mobility management protocol based on the Host Identity Protocol
    Toledo, Nerea
    Higuero, Marivi
    Astorga, Jasone
    Aguado, Marina
    Marie Bonnin, Jean
    COMPUTERS & SECURITY, 2013, 32 : 1 - 18