To see the other types of publications on this topic, follow the link: LI. Authentication, and access control.

Journal articles on the topic 'LI. Authentication, and access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'LI. Authentication, and access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos, and José-Javier Martinez-Herráiz. "Access Control beyond Authentication." Security and Communication Networks 2021 (October 1, 2021): 1–11. http://dx.doi.org/10.1155/2021/8146553.

Full text
Abstract:
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
APA, Harvard, Vancouver, ISO, and other styles
2

Sandhu, Ravi, and Pierangela Samarati. "Authentication, access control, and audit." ACM Computing Surveys 28, no. 1 (March 1996): 241–43. http://dx.doi.org/10.1145/234313.234412.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Jing, Yang Xiao, and C. L. Philip Chen. "Internet of things' authentication and access control." International Journal of Security and Networks 7, no. 4 (2012): 228. http://dx.doi.org/10.1504/ijsn.2012.053461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Harn, L., and H. Y. Lin. "Integration of user authentication and access control." IEE Proceedings E Computers and Digital Techniques 139, no. 2 (1992): 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ma, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang, and Bo Meng. "A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain." PLOS ONE 17, no. 9 (September 23, 2022): e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.

Full text
Abstract:
Self-sovereign identity authentication protocol is an active research topic in the field of identity authentication and management. However, the current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control. Therefore, a secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control is proposed. Firstly, the formal model of SSI including the SDPP-SSI identity model and management model is presented. And then, based on the federated blockchain, the distributed identifier is used as a global identifier for users in the decentralized domain. Finally, the verifiable statement is encapsulated using a policy control signature supporting privacy protection to develop the user’s access control for identity registration in the centralized domain. Compared with the related work (Lin 2018, Zhu 2018, Stokkink 2018, Hammudoglu 2017, Othman 2017, Abraham 2018, Guan 2019, Lin 2019) from controllability, security, flexibility, privacy protection, authentication and fine-grained access control, the proposed SSI authentication protocol not only meets controllability, authentication, and flexibility, but also supports privacy protection and fine-grained access control.
APA, Harvard, Vancouver, ISO, and other styles
6

Zuva, T. "Hybridization of Bimodal Biometrics for Access Control Authentication." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kakarla, Geeta, and S. Phani Kumar. "Blockchain Powered Mutual Authentication and Access Control Protocol." International Journal of Computer Networks and Applications 9, no. 1 (February 28, 2022): 103. http://dx.doi.org/10.22247/ijcna/2022/211629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

SUMI, Kazuhiko. "Biometrics Authentication and Application to Access Control Systems." Journal of The Institute of Electrical Engineers of Japan 129, no. 4 (2009): 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Galka, Jakub, Mariusz Masior, and Michal Salasa. "Voice authentication embedded solution for secured access control." IEEE Transactions on Consumer Electronics 60, no. 4 (November 2014): 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computers & Security 5, no. 4 (December 1986): 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Karger, Paul A. "Authentication and discretionary access control in computer networks." Computer Networks and ISDN Systems 10, no. 1 (August 1985): 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Iskhakov, Andrey Y., Anastasia O. Iskhakova, Roman V. Meshcheryakov, and Anton M. Smirnov. "Authentication model for mobile access subjects." IFAC-PapersOnLine 55, no. 9 (2022): 222–26. http://dx.doi.org/10.1016/j.ifacol.2022.07.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Qadir, Glena Aziz, and Bzar Khidir Hussan. "An Authentication and Access Control Model for Healthcare based Cloud Services." Journal of Engineering 29, no. 3 (March 1, 2023): 15–26. http://dx.doi.org/10.31026/j.eng.2023.03.02.

Full text
Abstract:
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.
APA, Harvard, Vancouver, ISO, and other styles
14

Lone, Sajaad Ahmed, and A. H. Mir. "Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment." International Journal of Information Technology and Computer Science 14, no. 4 (August 8, 2022): 34–47. http://dx.doi.org/10.5815/ijitcs.2022.04.04.

Full text
Abstract:
As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual attempting to ascertain is the individual in question. Thus, resulting in a more reliable, usable, and cost-effective model with a higher level of protection to deter an attacker from obtaining entry to a computer or network and gaining access to confidential data. This paper introduces a novel fingerprint-based authentication scheme for mobile environments, enabling user authentication based on fingerprint features using a challenge-response-based authentication process. In this study, the proposed authentication system has been developed on a real Android-based smartphone, tested on actual users, and performance analysis has been carried out; empirical results reveal that the proposed authentication scheme achieves increased performance. Moreover, a usability analysis has been done to determine efficiency, effectiveness, and user satisfaction. The evaluation results indicate its feasibility to use it as an effective authentication mechanism for mobile phone environments.
APA, Harvard, Vancouver, ISO, and other styles
15

Yin, Xu, and Hai Bei Zheng. "The Research of Workflow Access Control Methods Based on Spring Acegi." Advanced Materials Research 756-759 (September 2013): 710–14. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.710.

Full text
Abstract:
Access control through restricting users to access to resources, prevents invasion of illegal users and legal users access to unauthorized resources to ensure integrity and privacy of workflow data, which is the key of workflow security mechanism. According to the identity authentication and access authority control, the paper analyzes the safety management entrusted mechanism of Acegi which is Spring security framework, makes full use of its characteristics of depended injection (DI), and realizes statement and configuration of all kinds of safety components such as authentication management and access decision management.
APA, Harvard, Vancouver, ISO, and other styles
16

Kriti, Kriti, and Indu Kashyap. "Enhanced Role based Access Control: Integrating Auditing and Authentication." International Journal of Computer Applications 72, no. 2 (June 26, 2013): 15–22. http://dx.doi.org/10.5120/12465-8833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Chung, Youngseek, Soonho Jung, Junwoo Kim, Junghoon Lee, and Jaesang Cha. "LED-QR Authentication Technology for Access Control and Security." International journal of advanced smart convergence 4, no. 2 (November 30, 2015): 69–75. http://dx.doi.org/10.7236/ijasc.2015.4.2.69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Nam-Yih Lee. "Integrating access control with user authentication using smart cards." IEEE Transactions on Consumer Electronics 46, no. 4 (2000): 943–48. http://dx.doi.org/10.1109/30.920444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Arfaoui, Amel, Omar Rafik Merad Boudia, Ali Kribeche, Sidi-Mohammed Senouci, and Mohamed Hamdi. "Context-aware access control and anonymous authentication in WBAN." Computers & Security 88 (January 2020): 101496. http://dx.doi.org/10.1016/j.cose.2019.03.017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Xiao, Zhifeng, Bo Fu, Yang Xiao, C. L. Philip Chen, and Wei Liang. "A review of GENI authentication and access control mechanisms." International Journal of Security and Networks 8, no. 1 (2013): 40. http://dx.doi.org/10.1504/ijsn.2013.055046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Chen, Yuhua, and Jinghai Yin. "Design of electroencephalogram authentication access control to smart car." Healthcare Technology Letters 7, no. 4 (August 1, 2020): 109–13. http://dx.doi.org/10.1049/htl.2019.0092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zhu, Biaokai, Jumin Zhao, Dengao Li, Hong Wang, Ruiqin Bai, Yanxia Li, and Hao Wu. "Cloud access control authentication system using dynamic accelerometers data." Concurrency and Computation: Practice and Experience 30, no. 20 (April 15, 2018): e4474. http://dx.doi.org/10.1002/cpe.4474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Patel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh, and Jyoti Chauhan. "Access Control Framework Using Multi-Factor Authentication in Cloud Computing." International Journal of Green Computing 9, no. 2 (July 2018): 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.

Full text
Abstract:
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan, and Xiangyang Luo. "Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things." Sensors 19, no. 23 (November 28, 2019): 5237. http://dx.doi.org/10.3390/s19235237.

Full text
Abstract:
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.
APA, Harvard, Vancouver, ISO, and other styles
25

Marukhlenko, A. L., A. V. Plugatarev, M. O. Tanygin, L. O. Marukhlenko, and M. Yu Shashkov. "Option of Control of Access to Information Resources Based on Implicit Authentication." Proceedings of the Southwest State University 24, no. 2 (October 4, 2020): 108–21. http://dx.doi.org/10.21869/2223-1560-2020-24-2-108-121.

Full text
Abstract:
Purpose of research is to build a model of a system for effective authentication of mobile users based on public data of the user and his behavioral factors as well as to study algorithms for calculating the threshold value at which the authentication of a mobile device user is considered successful.Methods. When analyzing the behavioral factors of a user who needs to be authenticated when interacting with mobile devices, application of the following methods for calculating the threshold value are proposed: dynamic methods for determining the threshold value of user authentication based on the standard deviation and the calculation of the aggregate mean score; the method based on the standard when the system divides the aggregate flow of estimates into several blocks of the same length, where the first block is used for training, and the calculated threshold is used in the second block (this sequence of actions is repeated continuously, that is, the previous block provides training results for calculating the threshold for the current block); a method for calculating the aggregate mean score, where instead of using a single total score as input, the system uses the mean value of the current block, and the new calculated threshold is used as the threshold for decision making for the next block. A mathematical model that balances the speed and reliability of mobile users authentication is proposed.Results. The result of the research is the development of an effective system for calculating the threshold value of successful authentication of a mobile device user based on behavioural features which adapts to changes of the user's behavioural factors. Experimental studies and comparisons with analogs confirming the completeness and correctness were carried out as well as various variants of the proposed solutions.Conclusion. The proposed method of implicit authentication for mobile access control is easy to implement, easy to use, and adaptive to changes in input data. Options for calculating the threshold value at which implicit authentication is considered successful are also proposed.
APA, Harvard, Vancouver, ISO, and other styles
26

Shu, Yingli, Quande Yuan, Wende Ke, and Lei Kou. "Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism." Electronics 11, no. 23 (November 28, 2022): 3938. http://dx.doi.org/10.3390/electronics11233938.

Full text
Abstract:
With the continuous increase in the proportion of wind power construction and grid connection, the deployment scale of state sensors in wind-power-monitoring systems has grown rapidly with an aim on the problems that the communication authentication process between the wind turbine status sensor and the monitoring gateway is complex and the adaptability of the massive sensors is insufficient. A security access control method for a wind-power-monitoring system based on agile authentication mechanism is proposed in this paper. First, a lightweight key generation algorithm based on one-way hash function is designed. The algorithm realizes fixed-length compression and encryption of measurement data of any length. Under the condition of ensuring security, the calculation and communication cost in the later stage of authentication are effectively reduced. Second, to reduce the redundant process of wind turbine status sensor authentication, an agile authentication model of wind turbine status sensor based on a lightweight key is constructed. Constrained by the reverse order extraction of key information in the lightweight keychain, the model can realize lightweight communication between massive wind turbine status sensors and regional gateways. Finally, the proposed method is compared and verified using the wind turbine detection data set provided by the National New Energy Laboratory of the United States. The experimental results show that this method can effectively reduce the certification cost of a wind-power-monitoring system. Additionally, it can improve the efficiency of status sensor identity authentication and realize the agility and efficiency of the authentication process.
APA, Harvard, Vancouver, ISO, and other styles
27

Eaton, Jonathan. "Project headline: Access control and authentication ‐ issues for access to networked information resources." New Review of Academic Librarianship 4, no. 1 (January 1998): 11–17. http://dx.doi.org/10.1080/13614539809516764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Pu, Li'e, and Jialin Sun. "Face Detection-Induced Access Control System via Large Margin Metric Learning." International Journal of Distributed Systems and Technologies 13, no. 3 (July 1, 2022): 1–11. http://dx.doi.org/10.4018/ijdst.307987.

Full text
Abstract:
With the development of science and technology and the acceleration of economic integration, identity authentication has become the most basic element in cyberspace and the basis of the whole information security system. Biometric recognition technology is an important technology in the process of identity authentication. Among them, face recognition technology has been favored by researchers, social applications, and users in the field of identity authentication by virtue of its inherent advantages such as ease of use and insensitivity. In this paper, a face recognition-based access control system is established with the help of large margin metric learning. First, a face library is input into a deep neural network to extract representation features. Second, the deep representation features are used to learn a large margin metric learning model. Third, the face image is captured by a digital camera to input into large margin metric learning model for identifying the person. The experimental results show that the proposed system can accurately identify most of the persons.
APA, Harvard, Vancouver, ISO, and other styles
29

Nwogu, Chijioke, Monday Eze, and Charles Okunbor. "Design and Implementation of Access Door Control with Mo-bile Alert." International Journal of Engineering & Technology 9, no. 2 (May 7, 2020): 480. http://dx.doi.org/10.14419/ijet.v9i2.30382.

Full text
Abstract:
The necessity for adequate security of lives and properties cannot be overemphasized. Tackling insecurity in an effective manner calls for active computer-based researches and solutions. Essentially a security system is designed to help detect intrusion and prevent unauthorized access. These security threats are tracked by installing various security access doors and alarm systems. Findings have shown that many access doors use either password or biometric form of authentication separately which are easily compromised. This paper presents a two level automated access control for door security with mobile alert system, powered by a 5V, 6000mAH battery. In addition a multi factor authentication using biometrics (fingerprint) and password was also used to enhance access control for this system. A mobile phone call alert and alarm system was uniquely included to this design to notify owners of the presence of an intruder when multiple attempts of incorrect login credentials are presented to the system over a short period of time. The program for the microcontroller was written in C language. This paper concluded that the use of multi factor authentication with mobile phone call alert will help improve the security for access doors used in banks, residential buildings, hospitals, military properties and other institutions and where confidentiality and restrictions are needed.
APA, Harvard, Vancouver, ISO, and other styles
30

Satanasaowapak, Pak, Witawat Kawseewai, Suchada Promlee, and Anuwat Vilamat. "Residential access control system using QR code and the IoT." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 4 (August 1, 2021): 3267. http://dx.doi.org/10.11591/ijece.v11i4.pp3267-3274.

Full text
Abstract:
This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.
APA, Harvard, Vancouver, ISO, and other styles
31

Hajny, Jan, Petr Dzurenda, and Lukas Malina. "Multidevice Authentication with Strong Privacy Protection." Wireless Communications and Mobile Computing 2018 (July 29, 2018): 1–12. http://dx.doi.org/10.1155/2018/3295148.

Full text
Abstract:
Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily eavesdropped on and counterfeited. The privacy-preserving features are almost missing in these systems. To improve this state, we propose a novel cryptographic scheme based on efficient zero-knowledge proofs and Boneh-Boyen signatures. The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. This feature is particularly important in applications for controlling access to dangerous sites where the presence of protective equipment is checked during each access control session. Besides the full cryptographic specification, we also show the results of our implementation on devices commonly used in access control applications, particularly the smart cards and embedded verification terminals. By avoiding costly operations on user devices, such as bilinear pairings, we were able to achieve times comparable to existing systems (around 500 ms), while providing significantly higher security, privacy protection, and features for RFID multidevice authentication.
APA, Harvard, Vancouver, ISO, and other styles
32

Gajmal, Yogesh M., and Udayakumar R. "Analysis of Authentication based Data Access Control Systems in Cloud." Journal of Advanced Research in Dynamical and Control Systems 12, no. 07-SPECIAL ISSUE (June 30, 2020): 2961–67. http://dx.doi.org/10.5373/jardcs/v12sp7/20202441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Stasev, Yu V., I. D. Gorbenko, and N. V. Pastukhov. "Authentication in space system communication and control with numerous access." Kosmìčna nauka ì tehnologìâ 3, no. 1-2 (January 30, 1997): 83–86. http://dx.doi.org/10.15407/knit1997.01.083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Ling. "Research on Role Access Control Model Based on Identity Authentication." Journal of Physics: Conference Series 2025, no. 1 (September 1, 2021): 012105. http://dx.doi.org/10.1088/1742-6596/2025/1/012105.

Full text
Abstract:
Abstract Cryptography and access control are the core technologies for a secure operating system. Cryptography can guarantee the confidentiality, integrity, availability and unforgeability of information in the access control system. In the identity-based cryptosystem, the user’s private key is centrally generated by the key distribution center, and key escrow is a major security risk. In view of this problem, it is proposed that multiple trusted entities participate in the key distribution scheme in a serial manner. At the same time, this paper adds a separate blind factor to each user to increase security of the scheme; it also introduces the concept of virtual key, which uses additivity of the key space in the pair-based encryption scheme. In key generation, a timestamp T is added, which enables one-time pad of the system, enhances security of the system, and eliminates collusion attacks by KGC and multiple KPA. Finally, the improved signcryption scheme is combined with the RBAC model, and the I_RBAC model is proposed, which enables identity authentication and information confidentiality of users in simple communication in the RBAC model. Finally, the efficiency and safety of this scheme are analyzed.
APA, Harvard, Vancouver, ISO, and other styles
35

Godovnikov, Evgeny A., Anatoliy V. Shicelov, and Ruslan T. Usmanov. "Design of physical access control system with integrated wireless authentication." Yugra State University Bulletin 15, no. 2 (December 10, 2019): 23–28. http://dx.doi.org/10.17816/byusu20190223-28.

Full text
Abstract:
This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.
APA, Harvard, Vancouver, ISO, and other styles
36

Wang, Gui Chao, Ai Li Zhang, and Yong Zhen Li. "Secure Authentication Protocol of RFID System Based on Access Control." Advanced Engineering Forum 6-7 (September 2012): 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.

Full text
Abstract:
The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.
APA, Harvard, Vancouver, ISO, and other styles
37

Yuanchao Shu, Yu Jason Gu, and Jiming Chen. "Dynamic Authentication with Sensory Information for the Access Control Systems." IEEE Transactions on Parallel and Distributed Systems 25, no. 2 (February 2014): 427–36. http://dx.doi.org/10.1109/tpds.2013.153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yen, Sung-Ming, and Chi-Sung Laih. "The design of dynamic access control scheme with user authentication." Computers & Mathematics with Applications 25, no. 7 (April 1993): 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Wu, Wei-Chen, and Yi-Ming Chen. "Improving the Authentication Scheme and Access Control Protocol for VANETs." Entropy 16, no. 11 (November 19, 2014): 6152–65. http://dx.doi.org/10.3390/e16116152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Zhang, Leyou, Yadi Ye, and Yi Mu. "Multiauthority Access Control With Anonymous Authentication for Personal Health Record." IEEE Internet of Things Journal 8, no. 1 (January 1, 2021): 156–67. http://dx.doi.org/10.1109/jiot.2020.3000775.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Al-Mahmud, Abdullah, and Matei Ciobanu Morogan. "Identity-based Authentication and Access Control in Wireless Sensor Networks." International Journal of Computer Applications 41, no. 13 (March 31, 2012): 18–24. http://dx.doi.org/10.5120/5602-7858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Yuan, Hu, Carsten Maple, Yi Lu, and Tim Watson. "Peer-assisted location authentication and access control for wireless networks." Internet Technology Letters 2, no. 1 (September 7, 2018): e71. http://dx.doi.org/10.1002/itl2.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ferrazani Mattos, Diogo Menezes, and Otto Carlos Muniz Bandeira Duarte. "AuthFlow: authentication and access control mechanism for software defined networking." Annals of Telecommunications 71, no. 11-12 (March 28, 2016): 607–15. http://dx.doi.org/10.1007/s12243-016-0505-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ding, Yuhang, Yanran Zhang, Bo Qin, Qin Wang, Zihan Yang, and Wenchang Shi. "A Scalable Cross-Chain Access Control and Identity Authentication Scheme." Sensors 23, no. 4 (February 10, 2023): 2000. http://dx.doi.org/10.3390/s23042000.

Full text
Abstract:
Cross-chain is an emerging blockchain technology which builds the bridge across homogeneous and heterogeneous blockchains. However, due to the differentiation of different blockchains and the lack of access control and identity authentication of cross-chain operation subjects, existing cross-chain technologies are struggling to accomplish the identity transformation of cross-chain subjects between different chains, and also pose great challenges in terms of the traceability and supervision of dangerous transactions. To address the above issues, this paper proposes a scalable cross-chain access control and identity authentication scheme, which can authenticate the legitimacy of blockchains in the cross-chain system and ensure that all cross-chain operations are carried out by verified users. Furthermore, it will record all cross-chain operations with the help of Superchain in order to regulate and trace illegal transactions. Our scheme is scalable and, at the same time, has low invasiveness to blockchains in the cross-chain system. We implement the scheme and accordingly conduct the evaluations, which prove its security, efficiency, and scalability.
APA, Harvard, Vancouver, ISO, and other styles
45

Буяков, К. Е., Д. А. Елизаров, М. Я. Епифанцева, Т. А. Мызникова, and А. В. Шилер. "Development of biometric access control system." Vestnik of Russian New University. Series «Complex systems: models, analysis, management», no. 2 (June 21, 2022): 43–51. http://dx.doi.org/10.18137/rnu.v9187.22.02.p.043.

Full text
Abstract:
Рассмотрены особенности современной архитектуры систем контроля и управления доступом, лучшие практики и тренды в области обеспечения безопасности посредством системы контроля и управления доступом, а также их основные характеристики. Доказана актуальность разработки программно-аппаратного комплекса контроля доступа с использованием биометрической системы аутентификации, основанной на распознавании отпечатков пальцев. Разработанная система обеспечивает гибкую интеграцию с корпоративными сервисами организации. The article discusses the features of the modern architecture of access control systems, best practices and trends in the field of security, as well as the main characteristics. The relevance of the development of a software and hardware complex for access control using a biometric authentication system based on fingerprint recognition. The developed system provides flexible integration with corporate services of the organization.
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Ke He, Hong Jiang Ji, Long Chen, and Tong Zhang. "A Trusted Process Security Model for the Access to Power Enterprise Data Center." Advanced Materials Research 341-342 (September 2011): 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.

Full text
Abstract:
Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.
APA, Harvard, Vancouver, ISO, and other styles
47

Yu, Linsheng, Mingxing He, Hongbin Liang, Ling Xiong, and Yang Liu. "A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services." Sensors 23, no. 3 (January 22, 2023): 1264. http://dx.doi.org/10.3390/s23031264.

Full text
Abstract:
Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments. Traditional centralized access control models relying on third party trust face a critical challenge due to a high trust cost and single point of failure. Blockchain can achieve the distributed trust for access control designs in a mutual untrustworthy scenario, but it also leads to expensive storage overhead. Considering the above issues, this work constructed an authentication and authorization scheme based on blockchain that can provide a dynamic update of access permissions by utilizing the smart contract. Compared with the conventional authentication scheme, the proposed scheme integrates an extra authorization function without additional computation and communication costs in the authentication phase. To improve the storage efficiency and system scalability, only one transaction is required to be stored in blockchain to record a user’s access privileges on different service providers (SPs). In addition, mobile users in the proposed scheme are able to register with an arbitrary SP once and then utilize the same credential to access different SPs with different access levels. The security analysis indicates that the proposed scheme is secure under the random oracle model. The performance analysis clearly shows that the proposed scheme possesses superior computation and communication efficiencies and requires a low blockchain storage capacity for accomplishing user registration and updates.
APA, Harvard, Vancouver, ISO, and other styles
48

Khan, Abdul Raouf, and Latifa Khalid Alnwihel. "A Brief Review on Cloud Computing Authentication Frameworks." Engineering, Technology & Applied Science Research 13, no. 1 (February 1, 2023): 9997–10004. http://dx.doi.org/10.48084/etasr.5479.

Full text
Abstract:
Cloud computing is among the most widely used technologies worldwide as it helps individual users and organizations to store and share information conveniently and cost-effectively. However, data security is a major concern in cloud computing. Security involves guaranteed access to the data only to authorized users and protection against various threats and attacks. Security is generally achieved through the appropriate and efficient implementation of access control, authentication, and authorization mechanisms. Various frameworks have been proposed and implemented for authentication and access control in cloud computing. This paper discusses some of the main authentication frameworks in cloud computing, highlighting their methodologies, algorithms, and problems and identifying the issues that should form the focus of research in the area.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhu, Xianwei, ChaoWen Chang, Qin Xi, and ZhiBin Zuo. "Attribute-Guard: Attribute-Based Flow Access Control Framework in Software-Defined Networking." Security and Communication Networks 2020 (January 10, 2020): 1–18. http://dx.doi.org/10.1155/2020/6302739.

Full text
Abstract:
Software-defined networking (SDN) decouples the control plane from the data plane, offering flexible network configuration and management. Because of this architecture, some security features are missing. On the one hand, because the data plane only has the packet forwarding function, it is impossible to effectively authenticate the data validity. On the other hand, OpenFlow can only match based on network characteristics, and it is impossible to achieve fine-grained access control. In this paper, we aim to develop solutions to guarantee the validity of flow in SDN and present Attribute-Guard, a fine-grained access control and authentication scheme for flow in SDN. We design an attribute-based flow authentication protocol to verify the legitimacy of the validity flow. The attribute identifier is used as a matching field to define a forwarding control. The flow matching based on the attribute identifier and the flow authentication protocol jointly implement fine-grained access control. We conduct theoretical analysis and simulation-based evaluation of Attribute-Guard. The results show that Attribute-Guard can efficiently identify and reject fake flow.
APA, Harvard, Vancouver, ISO, and other styles
50

Singh, Inderpal, and Balraj Singh. "Access management of IoT devices using access control mechanism and decentralized authentication: A review." Measurement: Sensors 25 (February 2023): 100591. http://dx.doi.org/10.1016/j.measen.2022.100591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography