Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Evaluation of Authentication Schemes Based on Security, User-Friendliness and Complexity
Responsible organisation
2008 (English)Conference paper, Published paper (Other academic) PublishedAlternative title
Evaluering av autentiseringsmetoder baserad på säkerhet, användarvänlighet och komplexitet (Swedish)
Abstract [en]

In this work we are going to study and evaluate several SIMbased and non SIM-based authentication schemes for use in an IMS platform. The work will be done as part of the EUREKA!-funded Mobicome project. In this project eleven partners are participating in order to get a working prototype of the new generation network IMS to run. The major idea of the extended IMS functionality is seamlessness, both regarding network and device switching. Seamlessly working security solutions are a self-evident must in this context. In order to satisfy the customer while meeting technical boundary conditions, solutions must work in a satisfactory manner in many respects. On this background, this paper is a position paper, stating started and planned work on the evaluation of candidate security solutions for seamless IMS-based communications. First, the primary criteria of evaluation, namely security, user-friendliness and simplicity, are discussed. Then, the secondary criteria, which include awareness, usability and algorithms, are described. Along with the criteria, both sub-criteria and corresponding parameters are outlined. After this, the methodology for the evaluation is described. Finally, an outlook is presented at the end of the chapter.

Abstract [sv]

Ett första ansats för klassificering av sömlösa säkerhetslösningar med tanke på säkerhetsnivå, användarvänlighet och enkelhet som förstahands kriterier samt medvetenhet, användbarhet och algoritmer som andrahands kriterier. Dessutom beskrivs evalueringsmetoder. IMS, säkerhet, sömlös autentifiering, evalueringskriteria

Place, publisher, year, edition, pages
Athens, Greece, 2008.
Keywords [en]
IMS security, seamless authentication, evaluation criteria
National Category
Telecommunications Computer Sciences
Identifiers
URN: urn:nbn:se:bth-8027Local ID: oai:bth.se:forskinfo8E405DFED19CDE38C125760B004017F5OAI: oai:DiVA.org:bth-8027DiVA, id: diva2:835711
Conference
EuroNF IA.7.5 Workshop in Socio-Economic Issues of Networks of the Future
Available from: 2012-09-18 Created: 2009-08-07 Last updated: 2021-05-04Bibliographically approved

Open Access in DiVA

fulltext(113 kB)431 downloads
File information
File name FULLTEXT01.pdfFile size 113 kBChecksum SHA-512
6554de0b8c3c90e135c7966ab48597ff3222b241140ff31bcaff66a02d1fb07690893aa7f58ae108d320023c91832adbbf955b235c9850e1f2d4b672f316e3e4
Type fulltextMimetype application/pdf

Authority records

Fiedler, Markus

Search in DiVA

By author/editor
Fiedler, Markus
TelecommunicationsComputer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 431 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 360 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf