An Integrated Security Mechanism for Intranet Accessing

被引:0
|
作者
Lin Jianhui [1 ]
Huang Xuepeng [1 ]
机构
[1] Hubei Univ Police, Dept Informat Technol, Wuhan, Hubei Province, Peoples R China
关键词
User authentication; Trusted compute; USB key; Encrypt information; MD5;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
User authentication has long been the cornerstone of intranet security. This paper proposes an integrated security mechanism based on USB-key and MD5 authentication, which improve the system security and enhance the availability of the intranet computers. A USB-key driver is loaded as a system service and read the status of USB-key to decide whether to start the computer. For user authentication an optimized MD5 algorithm is put forward to protect the transfer of user's identity information. Experiment results prove the feasibility and reliability of the model.
引用
收藏
页码:4959 / 4964
页数:6
相关论文
共 50 条
  • [1] An integrated model for Intranet security using Prevention and Detection techniques
    Baraka, H
    El-Manawy, HA
    Attiya, A
    THIRD IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 1998, : 498 - 502
  • [2] Intranet security
    Canterucci, J
    TRAINING & DEVELOPMENT, 1997, 51 (02): : 47 - 47
  • [3] Intranet security
    Schwarzwalder, R
    DATABASE, 1999, 22 (02): : 58 - +
  • [4] Intranet security
    Davies, JE
    ELECTRONIC LIBRARY, 1998, 16 (04): : 267 - 268
  • [5] Research on Security Mechanism of Power Intranet Based on Data Mining Technology
    Luo Zhenyu
    PROCEEDINGS OF 2021 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INFORMATION SYSTEMS (ICAIIS '21), 2021,
  • [6] Managing intranet security
    Database Network J, 1 (07):
  • [7] Intranet security for remote users
    不详
    DATAMATION, 1996, 42 (03): : 23 - 23
  • [8] Intranet application security checklist
    INFOSEC Engineering
    Comput Secur J, 1 (47-53):
  • [9] A Security Architecture for Intranet Based on Security Area Division
    Gao Fuxiang
    Li Sha
    Wang Xiaolu
    Yao Lan
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 539 - 543
  • [10] Security enhanced to GSI: An integrated framework with a mechanism
    Zhang, BL
    Hu, HP
    Wu, XG
    Kong, T
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 506 - 513