Security management mechanism for composite applications based on hash chains

With the opening up of telecom network resources to third parties, more and more value-added composite applications are developed and deployed. Security management for these composite applications becomes a practical and important issue. This paper presents a new security management mechanism based on hash chains. The new mechanism can provide real time authentication/authorization, real time execution process management, and real time charging validation for composite applications at the same time. In addition the new mechanism is very simple and efficient.

[1]  Claude Godart,et al.  Reliable Web services composition using a transactional approach , 2005, 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service.

[2]  Yibo Zhang,et al.  Charging Validation for Third Party Value-Added Applications in Service Delivery Platform , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.

[3]  Corrado Moiso,et al.  Security Analysis of Parlay/OSA Framework , 2004 .

[4]  Yang Fang-chun,et al.  A Study on the Security Features of the Parlay API Based Application Behavior , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  L. Klostermann,et al.  Opening the networks with Parlay/OSA: standards and aspects behind the APIs , 2003, IEEE Netw..