INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL

被引:21
|
作者
HARN, L
LIN, HY
机构
[1] Univ of Missouri Kansas City, Kansas City, KS
来源
关键词
USER AUTHENTICATION; ACCESS CONTROL;
D O I
10.1049/ip-e.1992.0022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication and access control are both necessary mechanisms for data protection in a computer system. Traditionally, they are implemented in different modules. In this paper, a new solution is presented to provide user authentication and access control in a single module to avoid any possible security breach between these two protection mechanisms. The secret information required for the whole system is minimised and the difficulty of password comprising increased to improve system security. More importantly, with time complexity of implementation almost equivalent to that found in the normal public key based password authentication schemes and limited extra storage space, both user authentication and access control can be achieved at the same time.
引用
收藏
页码:139 / 143
页数:5
相关论文
共 50 条
  • [31] User authentication and access management
    Potter, L
    Bide, M
    [J]. PUBLISHING RESEARCH QUARTERLY, 1999, 15 (02) : 24 - 29
  • [32] User authentication and access management
    Liz Potter
    Mark Bide
    [J]. Publishing Research Quarterly, 1999, 15 : 24 - 29
  • [33] A MEDIUM ACCESS-CONTROL PROTOCOL FOR AN ATM ACCESS NETWORK
    CASALS, O
    GARCIA, J
    BLONDIA, C
    [J]. HIGH SPEED NETWORKS AND THEIR PERFORMANCE, 1994, 21 : 289 - 308
  • [34] Distributed proving in access-control systems
    Bauer, L
    Gartiss, S
    Reiter, MK
    [J]. 2005 IEEE Symposium on Security and Privacy, Proceedings, 2005, : 81 - 95
  • [35] DYNAMIC ACCESS-CONTROL FOR RELATIONAL VIEWS
    ROUSSOPOULOS, N
    BADER, C
    [J]. INFORMATION SYSTEMS, 1985, 10 (03) : 361 - 369
  • [36] THE SOURCE OF AUTHORITY FOR COMMERCIAL ACCESS-CONTROL
    MOFFETT, JD
    SLOMAN, MS
    [J]. COMPUTER, 1988, 21 (02) : 59 - 69
  • [37] Access-control language for multidomain environments
    Joshi, JBD
    Bhatti, R
    Bertino, E
    Ghafoor, A
    [J]. IEEE INTERNET COMPUTING, 2004, 8 (06) : 40 - 50
  • [38] A Decade of OS Access-Control Extensibility
    Watson, Robert N. M.
    [J]. COMMUNICATIONS OF THE ACM, 2013, 56 (02) : 52 - 63
  • [39] ACCESS-CONTROL METHODS OF VAX/VMS
    REISINGER, DA
    [J]. INFORMATION AGE, 1988, 10 (03): : 162 - 168
  • [40] ACCESS-CONTROL FOR COMPUTER-SYSTEMS
    FARQUHAR, W
    [J]. INFORMATION AGE, 1985, 7 (01): : 25 - 29