An authentication model for multilevel security domains

被引:0
|
作者
Jiang, YX [1 ]
Lin, C [1 ]
Tan, ZX [1 ]
机构
[1] Tsing Hua Univ, Dept Sci & Technol, Beijing 100084, Peoples R China
关键词
lattice; authentication; multilevel; security domain; BAN logic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A large network is composed of many autonomous security domains. Based on the definition of security domain, a lattice model of security domains is described. Subsequently, a model of multilevel security domains combined with the multilevel security is derived. Another important concept tied up with multilevel security domains is authentication. According to the trust relationships between different security domains, an authentication architecture and two authentication protocols suitable for multilevel security domains are proposed in this paper. At last, the authentication protocol is formally analyzed with the aid of the BAN logic.
引用
收藏
页码:1534 / 1539
页数:6
相关论文
共 50 条
  • [21] A novel trusted computing model for network security authentication
    Xing, Ling
    Jiang, Ling
    Yang, Guohai
    Wen, Bin
    [J]. Journal of Networks, 2014, 9 (02) : 339 - 343
  • [22] A cross-authentication model for heterogeneous domains in active networks*
    Chen, Qiong
    Li, Zhongwen
    Yu, Shui
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 140 - +
  • [23] An authentication model for multi-type domains in active networks
    Rong Rong
    Li Zhong-wen
    Jiang Ye-feng
    [J]. 2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 350 - +
  • [24] Enhancing Security Using Secure Authentication Model in Fog Computing Model
    Kavuri K. S. V. A. Satheesh
    T. Krishna Sree
    [J]. Wireless Personal Communications, 2023, 130 : 909 - 933
  • [25] Enhancing Security Using Secure Authentication Model in Fog Computing Model
    Satheesh, Kavuri K. S. V. A.
    Sree, T. Krishna
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 909 - 933
  • [26] A Model Driven Method for Multilevel Security Systems Design
    Zielinski, Zbigniew
    Stasiak, Andrzej
    Dabrowski, Wlodzimierz
    [J]. PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (02): : 120 - 125
  • [27] A multilevel security model based on communication channel capacity
    Liu, Xiong
    Zhuo, Xue-Jun
    Tang, Yong-Li
    Dai, Yi-Qi
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2010, 38 (10): : 2460 - 2464
  • [28] SECURITY IN A MULTILEVEL STRUCTURED MODEL OF A DATA-BASE
    GUDES, E
    KOCH, HS
    STAHL, FA
    [J]. COMPUTER JOURNAL, 1979, 22 (04): : 303 - 306
  • [29] Authorization Model for Multilevel Security Workflow Based on RTBAC
    Wang, Lei
    Xie, Xiaoyao
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 520 - 523
  • [30] Single Sign-on System Security Authentication Model Research
    Liu, Yiqin
    [J]. 2016 ISSGBM INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND SOCIAL SCIENCES (ISSGBM-ICS 2016), PT 3, 2016, 68 : 494 - 498