Skip to main content
Log in

Abstract

Concepts and principles of TINA (Telecommunications Information Networking Architecture) are introduced with the objective of correcting problems of the current centralized service control and service data model in an IN (Intelligent Network). It is becoming increasingly clear that the future sophisticated telecommunication services, e.g., multimedia, and multi-party conferencing, breaking away from the traditional telephony call model will need the solutions for rapid and efficient introduction, deployment, operations, and management.

In this paper, we discuss accounting features and requirements, as well as security services in the TINA management context. We will introduce and present an implementation of a model for a security management, based on secure objects, cryptography and certificate distribution. In order to provide secure services, secure objects that have security functionality, such as authentication and access control, have been defined. Secure objects in our model are CORBA objects. The security domain is also called SBS (Security Base Server), provides security services and has an SMIB (Security Management Information Base) that contains security policies, cryptographic algorithms, and other relevant information. A prototype has been implemented and some experimental results are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

REFERENCES

  1. F. Steegmans, TINA network resource architecture, TINA-C, http://www.tinac.com, 1997.

  2. G. Pavlou, and D. Griffin, Realizing TMN-like management services in TINA. Journal of Network and Systems Management, Vol.5, No.4, pp. 437-457, December 1997.

    Google Scholar 

  3. T. Hamada, Accounting management architecture, TINA-C, http://www.tinac.com, 1996.

  4. L. Kristiansen, TINA service architecture 5.0, TINA-C, http://www.tinac.com, 1997.

  5. M. Yates, W. Takita, L. Demoudem, R. Jansson, and H. Mulder, TINA business model and reference points, TINA-C, http://www.tinac.com, 1997.

  6. P. Farley, TINA retailer reference point specification, Version. 1.0, TINA-C, http://www.tinac.com, 1998.

  7. C. Abarca, TINA service component specification, Version. 1.0b, TINA-C, http://www.tinac.com, 1998.

  8. M. Pampaey and A. Couturier, Using TINA concepts for IN evolution, IEEE Communication Magazine, June 2000.

  9. Journal of Network and Systems Management, Special Issue on Telecommunications Information Networking Architecture (TINA), Leith Campbell, Harm Mulder, and Juan Pavon, Guest Eds. Vol.5 No.4, December 1997.

  10. N. Natarajan, H. Flinck, and R. Rosli, TINA network resource information model specification, TINA-C, http://www.tinac.com, 1997.

  11. ITU-T Recommendation X.742, Information Technology--Open Systems Interconnection--Systems management: Accounting meter function, July 1994.

  12. L. F. Kormann, C. B. Westphall, and A. Coser, OSI usage metering function for OSIMIS management platform, Journal of Network and Systems Management, Vol.4, No.3, 1996.

  13. P. Hellemans, K. Daenen, C. Redmond, and D. Lewis, Accounting management in a TINA-based service and network environment, Sixth International Conference on Intelligence in Services and Networks, (IS&N'99), Barcelona, April 1999.

  14. Visibroker 3.04 http://www.inprise.com.

  15. Object Management Group. The Common Object Request Broker Architecture 2.0/IIOP--Specification Revision 2.0--OMG Document, August 1996.

  16. A. Sekkaki, L. C. Alvarez, W. T. Watanabe, and C. B. Westphall, Accounting management based service in a TINA architecture, IFIP/IEEE International Symposium on Integrated Network Management, Seattle, Washington, May 14-18 2001.

  17. J. H. Hahn, K. H. Lee, and J. C. Ryou, A model of secutity platform within TINA based management system, APNOMs, 1998.

  18. A. Sekkaki, D. Nguessan, M. D. Müller, and C. B. Westphall, Security within TINA accounting architecture management. ICC2001, IEEE International Conference on Communications, Helsinki, Finlândia, June 2001.

  19. W. Stallings, Cryptography and Networks Security. Principals and Practices. Second edition.

  20. R. Brennan, B. Jennings, C. McArdle, and T. Curran, Teletec Irland. Evolutionary trends in intelligent networks. IEEE Communications Magazine, June 2000.

  21. P. A. Loscocco, D.S. Stephen, A. M. Patrick, C. T. Ruth, S. Jeff, and J. F. Farrell, The inevitable of failure: The flawed assumption of security in modern computing environments. 21st National Information Systems Security Conference, Cristal City, Virginia, October 1998. National Security Agency, NISSC, htttp://www.jya.com/paperF1.htm.

    Google Scholar 

  22. C. M. Westphall, J. S. Fraga, C. B. Westphall, and S. C. S. Bianchi, Mandatory security policies for CORBA security model, IFIP/SEC2002 XVII International Conference on Information Security. pp. 251-262. Cairo, Egypt, May 7-9, 2002.

  23. A. Sekkaki, C. B. Westphall, L. L. Rossi, and I. V. Souza, Formal specification and verification of the accounting model of TINA architecture. GRES'2001. Marocco, Marrakech, 2001.

  24. R. S. Sandhu, D. Ferraiolo and R. Kuhn, The NIST model for role-based access control: Towards a unified standard, Proc. of the Fifth ACM/RBAC Conference, 2000. (http://www.acm.org/sigsac/rbac2000.html).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Carlos Becker Westphall.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Westphall, C.B., Sekkaki, A., Alvarez, L.M.C. et al. Extending TINA with Secure On-Line Accounting Services. Journal of Network and Systems Management 11, 379–397 (2003). https://doi.org/10.1023/B:JONS.0000005470.09708.f0

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:JONS.0000005470.09708.f0

Navigation