{"title":"in中的身份验证和授权","authors":"Alexander Herrigel, Xuejia Lai","doi":"10.1109/INW.1994.729161","DOIUrl":null,"url":null,"abstract":"This paper presents a new authentication protocol for the Intelligent Network (IN). This protocol is suitable for the IN environment with its very different user devices in functionality and computing power. We show that the presented authentication protocol can be applied as a basis for an authorization service with a low key management complexity. This authorization service can be executed to propagate a distributed access control in the IN environment for third party service providers.","PeriodicalId":156912,"journal":{"name":"Workshop on Intelligent Network","volume":"358 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Authentication and Authorization in the IN\",\"authors\":\"Alexander Herrigel, Xuejia Lai\",\"doi\":\"10.1109/INW.1994.729161\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a new authentication protocol for the Intelligent Network (IN). This protocol is suitable for the IN environment with its very different user devices in functionality and computing power. We show that the presented authentication protocol can be applied as a basis for an authorization service with a low key management complexity. This authorization service can be executed to propagate a distributed access control in the IN environment for third party service providers.\",\"PeriodicalId\":156912,\"journal\":{\"name\":\"Workshop on Intelligent Network\",\"volume\":\"358 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Workshop on Intelligent Network\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INW.1994.729161\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Workshop on Intelligent Network","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INW.1994.729161","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper presents a new authentication protocol for the Intelligent Network (IN). This protocol is suitable for the IN environment with its very different user devices in functionality and computing power. We show that the presented authentication protocol can be applied as a basis for an authorization service with a low key management complexity. This authorization service can be executed to propagate a distributed access control in the IN environment for third party service providers.