Digital Tiger Symbol Authorization Method Based on PKI System

نویسندگان

چکیده

Under modern high-tech conditions, the importance of personnel authorization security is increasingly prominent. A set safe method can ensure that human resources are properly distributed to each unit, thus providing reliable guarantee for successful completion tasks. However, current still paper-based or verbal, prone errors inconsistencies, and difficult verify. In this paper, a digital Tiger Mark based on PKI system proposed, using cryptography technology provide support reliability authorization. This realizes fine authorization, be verified. The uses certificates assign people's identities their respective roles, encryption algorithms enforce access control policies prevent unauthorized access. feasibility verified by us in simulated cross-domain task environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Greenpass: Decentralized, PKI-based Authorization for Wireless LANs∗

In Dartmouth’s ”Greenpass” project, we’re building an experimental system to explore two levels of authorization issues in the emerging information infrastructure. On a practical level, we want to enable only authorized users to access an internal wireless network—while also permitting appropriate users to delegate internal access to external guests, and doing this all with standard client soft...

متن کامل

Pki-based System Management∗

This article deals with the deployment of a secure IT infrastructure on a company-wide basis. This means to be able to provide secure network services to the users, independent of their physical location: on-site (via LAN) or off-site (via WAN or an external ISP). The security solution is based on the usage of X.509 certificates to perform authentication both of the users and the network’s node...

متن کامل

Certificate Based Authorization Simulation System

Using certificates for distributed authorizations in computer network systems has been discussed in the literature. However real implementations of the concept are rarely seen. In our certificate based authorization simulation system (CBASS) project, we prototyped a computer system including some of the emulated functions of an operating system such as machine, user and file management, and emu...

متن کامل

A Hybrid PKI-IBC Based Ephemerizer System

The concept of an Ephemerizer system has been introduced in earlier works as a mechanism to ensure that a file deleted from the persistent storage remains unrecoverable. The principle involved storing the data in an encrypted form in the user’s machine and the key to decrypt the data in a physically separate machine. However the schemes proposed so far do not provide support for fine-grained us...

متن کامل

PKI and digital certification infrastructure

Secure VPN technology is only possible with the use of appropriate security systems such as encryption, digital signatures, digital certificates, public/private key pairs, non-repudiation, and time-stamping. A PKI comprises a system of certificates, certificate authorities, subjects, relying partners, registration authorities, and key repositories that provide for safe and reliable communicatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computing, performance and communication systems

سال: 2023

ISSN: ['2371-8870', '2371-8889']

DOI: https://doi.org/10.23977/cpcs.2023.070202