{"title":"新兴网络架构中的安全和身份验证问题,特别参考SONATE","authors":"Bhawana Rudra, A. Manu, O. Vyas","doi":"10.1109/CICN.2011.143","DOIUrl":null,"url":null,"abstract":"The emerging research to develop new architecture for next generation networks have made us think about the security incorporates \"inside\" the network architecture during the evolution phase. The aim is to provide better services to the user in a secured fashion. In this paper we describe three different security level approaches namely Micro level security, Medium level security and Macro level security with special reference to Service Oriented Network Architecture (SONATE).","PeriodicalId":292190,"journal":{"name":"2011 International Conference on Computational Intelligence and Communication Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Security and Authentication Issues in Emerging Network Architectures with Special Reference to SONATE\",\"authors\":\"Bhawana Rudra, A. Manu, O. Vyas\",\"doi\":\"10.1109/CICN.2011.143\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The emerging research to develop new architecture for next generation networks have made us think about the security incorporates \\\"inside\\\" the network architecture during the evolution phase. The aim is to provide better services to the user in a secured fashion. In this paper we describe three different security level approaches namely Micro level security, Medium level security and Macro level security with special reference to Service Oriented Network Architecture (SONATE).\",\"PeriodicalId\":292190,\"journal\":{\"name\":\"2011 International Conference on Computational Intelligence and Communication Networks\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Computational Intelligence and Communication Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICN.2011.143\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Computational Intelligence and Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICN.2011.143","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and Authentication Issues in Emerging Network Architectures with Special Reference to SONATE
The emerging research to develop new architecture for next generation networks have made us think about the security incorporates "inside" the network architecture during the evolution phase. The aim is to provide better services to the user in a secured fashion. In this paper we describe three different security level approaches namely Micro level security, Medium level security and Macro level security with special reference to Service Oriented Network Architecture (SONATE).