INTEGRATION OF USER AUTHENTICATION AND ACCESS-CONTROL

被引:21
|
作者
HARN, L
LIN, HY
机构
[1] Univ of Missouri Kansas City, Kansas City, KS
来源
关键词
USER AUTHENTICATION; ACCESS CONTROL;
D O I
10.1049/ip-e.1992.0022
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication and access control are both necessary mechanisms for data protection in a computer system. Traditionally, they are implemented in different modules. In this paper, a new solution is presented to provide user authentication and access control in a single module to avoid any possible security breach between these two protection mechanisms. The secret information required for the whole system is minimised and the difficulty of password comprising increased to improve system security. More importantly, with time complexity of implementation almost equivalent to that found in the normal public key based password authentication schemes and limited extra storage space, both user authentication and access control can be achieved at the same time.
引用
收藏
页码:139 / 143
页数:5
相关论文
共 50 条
  • [41] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1993, 15 (04): : 706 - 734
  • [42] SMART CARD AND ACCESS-CONTROL SYSTEMS
    LEMARCHANT, P
    [J]. ACTA ELECTRONICA, 1983, 25 (01): : 93 - 98
  • [43] ACCESS-CONTROL LISTS IN CAPABILITY ENVIRONMENTS
    LOPRIORE, L
    [J]. TSI-TECHNIQUE ET SCIENCE INFORMATIQUES, 1984, 3 (03): : 179 - 191
  • [44] A DEFINITION OF AN ACCESS-CONTROL SYSTEMS LANGUAGE
    EMMS, J
    [J]. COMPUTER STANDARDS & INTERFACES, 1987, 6 (04) : 443 - 454
  • [45] ACCESS-CONTROL FOR PRIVATE DECLARATIONS IN ADA
    SHEN, J
    CORMACK, GV
    [J]. COMPUTER LANGUAGES, 1994, 20 (02): : 117 - 126
  • [46] A CALCULUS FOR ACCESS-CONTROL IN DISTRIBUTED SYSTEMS
    ABADI, M
    BURROWS, M
    LAMPSON, B
    PLOTKIN, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 1 - 23
  • [47] CLASSIFICATION OF OBJECTS FOR IMPROVED ACCESS-CONTROL
    BOOYSEN, HAS
    ELOFF, JHP
    [J]. COMPUTERS & SECURITY, 1995, 14 (03) : 251 - 265
  • [48] A new key-lock method for user authentication and access control
    Ji, DY
    Zhang, FT
    Wang, YM
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2001, 10 (03) : 411 - 414
  • [49] A User Access Control Scheme for Reducing Authentication Keys in Cloud Systems
    Hong, Seungtae
    Kim, Hyeongil
    Kim, Taehoon
    Chang, Jaewoo
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (04): : 229 - 240
  • [50] Gene-Certificate Based Model for User Authentication and Access Control
    Sun, Feixian
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 228 - 235