2010
DOI: 10.1002/bltj.20426
|View full text |Cite
|
Sign up to set email alerts
|

On new security mechanisms for identity management: Recognizing and meeting telecom operator and enterprise needs

Abstract: Initially created by the information technology industry, the identity management (IdM) telecom operators. Indeed, since telecom operators "own" wireless and wireline access, they also "own" a great deal of information about their subscribers. In this respect, ownership encompasses: 1. The ability to authenticate (and, when necessary, authorize) proper and efficient subscriber access. 2. The actual possession of subscriber data. 3. The established trust of their subscribers.Based on these assets, telecom o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 14 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?