%0 Conference Proceedings %T Multi-level Authentication Based Single Sign-On for IMS Services %+ PRES Université de Toulouse %+ Université Cadi Ayyad [Marrakech] (UCA) %A Maachaoui, M. %A Abou El Kalam, Anas %A Fraboul, Christian %A Ait Ouahman, A. %Z Part 2: Work in Progress %< avec comité de lecture %( Lecture Notes in Computer Science %B 13th International Conference on Communications and Multimedia Security (CMS) %C Canterbury, United Kingdom %Y Bart Decker %Y David W. Chadwick %I Springer %3 Communications and Multimedia Security %V LNCS-7394 %P 174-187 %8 2012-09-03 %D 2012 %R 10.1007/978-3-642-32805-3_14 %K IMS %K SIP %K Service provider %K Single Sign-On (SSO) %K Multi-level- SSO %K SAML %K Authentication %Z Computer Science [cs] %Z Computer Science [cs]/Networking and Internet Architecture [cs.NI]Conference papers %X The IP multimedia Subsystem (IMS) is the evolution of the 3G mobile networks towards new generation networks (NGN) that are only IP based. This architectural framework is seen as a key element for achieving network convergence defining a new horizontal integrated service offering, based on a common signaling protocol (SIP) for all multimedia services such as Voice over IP, Video call, or instant messaging. However the present deployment of IMS is specified according to a specific model, the so called walled-garden. In this model the applications are only provided to the users within the same operator so that the users will not have to look for applications outside the IMS garden. It is a very restrictive access mode for the users because they remain dependent on services offered by the provider and can consequently not choose freely applications they want to subscribe for. The goal of this paper is to include Single Sign-On (SSO) features in the standing IMS architectures to allow the user accessing all the applications, even the external ones transparently, simulating a walled-garden environment. We also introduce the notion of security level that will be affected to the SPs, and implementing it in what we can call “a Multi-level authentication model”. %G English %Z TC 6 %Z TC 11 %2 https://inria.hal.science/hal-01540888/document %2 https://inria.hal.science/hal-01540888/file/978-3-642-32805-3_14_Chapter.pdf %L hal-01540888 %U https://inria.hal.science/hal-01540888 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TC6 %~ IFIP-CMS %~ IFIP-LNCS-7394