Role-based PMI authentication model and its application

被引:0
|
作者
Zhu yanqin [1 ]
Qian Peide [1 ]
Liu Yueqin [1 ]
机构
[1] Soochow Univ, Comp Sci & Technol Sch, Suzhou, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the development of information systems in Internet, user authentication and authorization management gradually become one of the biggest concerns. To solve the problem, this paper presents a role-based PMI authentication model. In the framework of the model we use role specification certificates(RSC) and role assignment certificates (RAC) to achieve secure access control to network resources. The model has been applied to an enterprise network for the privilege authentication processing. The practice shows that the model can be used to simplify authorization administration and provide expansibility and flexibility.
引用
收藏
页码:407 / +
页数:2
相关论文
共 50 条
  • [1] A Role-Based PMI Security Model for E-Government
    WU Li-jun
    [J]. Wuhan University Journal of Natural Sciences, 2005, (01) : 329 - 332
  • [2] Role-based authentication protocol
    Yao, Hongyan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 460 - 470
  • [3] A role-based coordination model and its realization
    Department of Computer Science, Illinois Institute of Technology, United States
    [J]. Inf, 2008, 3 (229-244):
  • [4] A Role-Based Coordination Model and its Realization
    Chen, Nianen
    Yu, Yue
    Ren, Shangping
    Beckman, Mattox
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (03): : 229 - 244
  • [5] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [6] Combining authentication with role-based access control based on IBS
    Wang, Jin
    Yu, Jia
    Li, Daxing
    Jia, Zhongtian
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1475 - 1480
  • [7] A Role-Based Model of Linux Privilege Management and its Implementation
    Li, Yanzhao
    Tu, Bibo
    Zhu, Min
    Meng, Dan
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1442 - 1445
  • [8] A role-based hierarchical group collaborative awareness model and its implementation
    Zhu, Jun
    Tang, Yong
    [J]. PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 12 - 16
  • [9] Role-based Runtime Model Synchronization
    Werner, Christopher
    Schoen, Hendrik
    Kuehn, Thomas
    Goetz, Sebastian
    Assmann, Uwe
    [J]. 44TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2018), 2018, : 306 - 313
  • [10] Role-Based Generic Model Refactoring
    Heimann, Jan
    Seifert, Mirko
    Assmann, Uwe
    [J]. MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PT II, 2010, 6395 : 78 - 92