Pour voir les autres types de publications sur ce sujet consultez le lien suivant : LI. Authentication, and access control.

Articles de revues sur le sujet « LI. Authentication, and access control »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleurs articles de revues pour votre recherche sur le sujet « LI. Authentication, and access control ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.

1

Junquera-Sánchez, Javier, Carlos Cilleruelo, Luis De-Marcos et José-Javier Martinez-Herráiz. « Access Control beyond Authentication ». Security and Communication Networks 2021 (1 octobre 2021) : 1–11. http://dx.doi.org/10.1155/2021/8146553.

Texte intégral
Résumé :
Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sandhu, Ravi, et Pierangela Samarati. « Authentication, access control, and audit ». ACM Computing Surveys 28, no 1 (mars 1996) : 241–43. http://dx.doi.org/10.1145/234313.234412.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Liu, Jing, Yang Xiao et C. L. Philip Chen. « Internet of things' authentication and access control ». International Journal of Security and Networks 7, no 4 (2012) : 228. http://dx.doi.org/10.1504/ijsn.2012.053461.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Harn, L., et H. Y. Lin. « Integration of user authentication and access control ». IEE Proceedings E Computers and Digital Techniques 139, no 2 (1992) : 139. http://dx.doi.org/10.1049/ip-e.1992.0022.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Ma, Binhao, Xurui Zheng, Can Zhao, Yibing Wang, Dejun Wang et Bo Meng. « A secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control based on federated blockchain ». PLOS ONE 17, no 9 (23 septembre 2022) : e0274748. http://dx.doi.org/10.1371/journal.pone.0274748.

Texte intégral
Résumé :
Self-sovereign identity authentication protocol is an active research topic in the field of identity authentication and management. However, the current SSI authentication protocols pay little attention to privacy protection and the fine-grained access control. Therefore, a secure and decentralized SSI authentication protocol with privacy protection and fine-grained access control is proposed. Firstly, the formal model of SSI including the SDPP-SSI identity model and management model is presented. And then, based on the federated blockchain, the distributed identifier is used as a global identifier for users in the decentralized domain. Finally, the verifiable statement is encapsulated using a policy control signature supporting privacy protection to develop the user’s access control for identity registration in the centralized domain. Compared with the related work (Lin 2018, Zhu 2018, Stokkink 2018, Hammudoglu 2017, Othman 2017, Abraham 2018, Guan 2019, Lin 2019) from controllability, security, flexibility, privacy protection, authentication and fine-grained access control, the proposed SSI authentication protocol not only meets controllability, authentication, and flexibility, but also supports privacy protection and fine-grained access control.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Zuva, T. « Hybridization of Bimodal Biometrics for Access Control Authentication ». International Journal of Future Computer and Communication 3, no 6 (décembre 2014) : 444–51. http://dx.doi.org/10.7763/ijfcc.2014.v3.344.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kakarla, Geeta, et S. Phani Kumar. « Blockchain Powered Mutual Authentication and Access Control Protocol ». International Journal of Computer Networks and Applications 9, no 1 (28 février 2022) : 103. http://dx.doi.org/10.22247/ijcna/2022/211629.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

SUMI, Kazuhiko. « Biometrics Authentication and Application to Access Control Systems ». Journal of The Institute of Electrical Engineers of Japan 129, no 4 (2009) : 237–40. http://dx.doi.org/10.1541/ieejjournal.129.237.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Galka, Jakub, Mariusz Masior et Michal Salasa. « Voice authentication embedded solution for secured access control ». IEEE Transactions on Consumer Electronics 60, no 4 (novembre 2014) : 653–61. http://dx.doi.org/10.1109/tce.2014.7027339.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Karger, Paul A. « Authentication and discretionary access control in computer networks ». Computers & ; Security 5, no 4 (décembre 1986) : 314–24. http://dx.doi.org/10.1016/0167-4048(86)90052-0.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Karger, Paul A. « Authentication and discretionary access control in computer networks ». Computer Networks and ISDN Systems 10, no 1 (août 1985) : 27–37. http://dx.doi.org/10.1016/0169-7552(85)90036-4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

Iskhakov, Andrey Y., Anastasia O. Iskhakova, Roman V. Meshcheryakov et Anton M. Smirnov. « Authentication model for mobile access subjects ». IFAC-PapersOnLine 55, no 9 (2022) : 222–26. http://dx.doi.org/10.1016/j.ifacol.2022.07.039.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Qadir, Glena Aziz, et Bzar Khidir Hussan. « An Authentication and Access Control Model for Healthcare based Cloud Services ». Journal of Engineering 29, no 3 (1 mars 2023) : 15–26. http://dx.doi.org/10.31026/j.eng.2023.03.02.

Texte intégral
Résumé :
Electronic Health Record (EHR) systems are used as an efficient and effective method of exchanging patients’ health information with doctors and other key stakeholders in the health sector to obtain improved patient treatment decisions and diagnoses. As a result, questions regarding the security of sensitive user data are highlighted. To encourage people to move their sensitive health records to cloud networks, a secure authentication and access control mechanism that protects users’ data should be established. Furthermore, authentication and access control schemes are essential in the protection of health data, as numerous responsibilities exist to ensure security and privacy in a network. So, the main goal of our suggested solution is to maintain a secure authentication and access control mechanism for health cloud data. Thus, in this work, Security Secret Key Provider (SSKP) phase is proposed for the E-healthcare-based cloud that consists of two parts. The first is an authentication scheme that is Security Secret Key (SSK) and the second is a modular access control mechanism. We explain the methodology of the proposed approach through appropriate evaluation results, which improves system security and performance by minimizing the time spent to get authentication and access the data. Simulation results indicate that our approach is significantly more effective than existing research.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Lone, Sajaad Ahmed, et A. H. Mir. « Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment ». International Journal of Information Technology and Computer Science 14, no 4 (8 août 2022) : 34–47. http://dx.doi.org/10.5815/ijitcs.2022.04.04.

Texte intégral
Résumé :
As the information put together by the blend of smartphones, the cloud, the IOT, and ubiquitous computing continue to expand at an alarming rate, a data breach increases. Today, users' strong authentication and authorization approaches are increasingly important to secure sensitive, confidential, secret information. Possession and knowledge-based authentication techniques for computers, the internet, email accounts, etc., are commonly used to access vital information; they do not link a user to an established identity, resulting in most security vulnerabilities. Biometric authentication, on the other hand, has the privilege of being more reliable than traditional authentication as biometric characteristics of a person can’t be lost; they are tough to distribute, exchange or duplicate; and it requires the user to be present during the authentication process, thereby relating the users to established identities. Biometrics provides a higher level of assurance that the individual attempting to ascertain is the individual in question. Thus, resulting in a more reliable, usable, and cost-effective model with a higher level of protection to deter an attacker from obtaining entry to a computer or network and gaining access to confidential data. This paper introduces a novel fingerprint-based authentication scheme for mobile environments, enabling user authentication based on fingerprint features using a challenge-response-based authentication process. In this study, the proposed authentication system has been developed on a real Android-based smartphone, tested on actual users, and performance analysis has been carried out; empirical results reveal that the proposed authentication scheme achieves increased performance. Moreover, a usability analysis has been done to determine efficiency, effectiveness, and user satisfaction. The evaluation results indicate its feasibility to use it as an effective authentication mechanism for mobile phone environments.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Yin, Xu, et Hai Bei Zheng. « The Research of Workflow Access Control Methods Based on Spring Acegi ». Advanced Materials Research 756-759 (septembre 2013) : 710–14. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.710.

Texte intégral
Résumé :
Access control through restricting users to access to resources, prevents invasion of illegal users and legal users access to unauthorized resources to ensure integrity and privacy of workflow data, which is the key of workflow security mechanism. According to the identity authentication and access authority control, the paper analyzes the safety management entrusted mechanism of Acegi which is Spring security framework, makes full use of its characteristics of depended injection (DI), and realizes statement and configuration of all kinds of safety components such as authentication management and access decision management.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Kriti, Kriti, et Indu Kashyap. « Enhanced Role based Access Control : Integrating Auditing and Authentication ». International Journal of Computer Applications 72, no 2 (26 juin 2013) : 15–22. http://dx.doi.org/10.5120/12465-8833.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Chung, Youngseek, Soonho Jung, Junwoo Kim, Junghoon Lee et Jaesang Cha. « LED-QR Authentication Technology for Access Control and Security ». International journal of advanced smart convergence 4, no 2 (30 novembre 2015) : 69–75. http://dx.doi.org/10.7236/ijasc.2015.4.2.69.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Nam-Yih Lee. « Integrating access control with user authentication using smart cards ». IEEE Transactions on Consumer Electronics 46, no 4 (2000) : 943–48. http://dx.doi.org/10.1109/30.920444.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
19

Arfaoui, Amel, Omar Rafik Merad Boudia, Ali Kribeche, Sidi-Mohammed Senouci et Mohamed Hamdi. « Context-aware access control and anonymous authentication in WBAN ». Computers & ; Security 88 (janvier 2020) : 101496. http://dx.doi.org/10.1016/j.cose.2019.03.017.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Xiao, Zhifeng, Bo Fu, Yang Xiao, C. L. Philip Chen et Wei Liang. « A review of GENI authentication and access control mechanisms ». International Journal of Security and Networks 8, no 1 (2013) : 40. http://dx.doi.org/10.1504/ijsn.2013.055046.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Chen, Yuhua, et Jinghai Yin. « Design of electroencephalogram authentication access control to smart car ». Healthcare Technology Letters 7, no 4 (1 août 2020) : 109–13. http://dx.doi.org/10.1049/htl.2019.0092.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
22

Zhu, Biaokai, Jumin Zhao, Dengao Li, Hong Wang, Ruiqin Bai, Yanxia Li et Hao Wu. « Cloud access control authentication system using dynamic accelerometers data ». Concurrency and Computation : Practice and Experience 30, no 20 (15 avril 2018) : e4474. http://dx.doi.org/10.1002/cpe.4474.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
23

Patel, Subhash Chandra, Sumit Jaiswal, Ravi Shankar Singh et Jyoti Chauhan. « Access Control Framework Using Multi-Factor Authentication in Cloud Computing ». International Journal of Green Computing 9, no 2 (juillet 2018) : 1–15. http://dx.doi.org/10.4018/ijgc.2018070101.

Texte intégral
Résumé :
The most challenging issues in cloud computing are access control and data security because users of the cloud outsource sensitive data and information to cloud provider servers, which are not within the same trusted domain as the data owner. Within cloud computing, various services and resources need protection from unauthorized use as a part of the security. Authentication is a key technology for information security. In recent years, a lot of research has been carried out throughout the world and several schemes have been proposed to improve authentication in the cloud. Remote authentication is the commonly used method to determine the identity of the remote client. In this article, the authors have proposed a systematic method for authenticating clients, namely by using a password, biometrics, and out-of-band-based access control mechanisms that are suitable for access control. The proposed system involves user ID/password, biometrics characteristics, and a mobile phone as a software token for one-time password generation.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Zhang, Qikun, Yongjiao Li Zhigang Li, Junling Yuan, Yong Gan et Xiangyang Luo. « Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things ». Sensors 19, no 23 (28 novembre 2019) : 5237. http://dx.doi.org/10.3390/s19235237.

Texte intégral
Résumé :
The development of the Internet of Things has led to great development of data sharing and data interaction, which has made security and privacy more and more a concern for users. How to ensure the safe sharing of data, avoid the leakage of sensitive information, and protect the privacy of users is a serious challenge. Access control is an important issue to ensure the trust of the Internet of Things. This paper proposes an access control scheme based on ciphertext attribute authentication and threshold policy, which uses the identity authentication of hidden attributes and divides the user’s permission grade by setting the threshold function with the user’s attributes. Users obtain different permission grades according to attribute authentication and access data of different sensitivity grades to achieve fine-grained, flexible and secure access to data in the cloud server while protecting personal privacy issues. In addition, when the resource is acquired, the identity and permission joint authentication method is adopted to avoid the collusion attack of the illegal member, which makes the resource access control more secure.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Marukhlenko, A. L., A. V. Plugatarev, M. O. Tanygin, L. O. Marukhlenko et M. Yu Shashkov. « Option of Control of Access to Information Resources Based on Implicit Authentication ». Proceedings of the Southwest State University 24, no 2 (4 octobre 2020) : 108–21. http://dx.doi.org/10.21869/2223-1560-2020-24-2-108-121.

Texte intégral
Résumé :
Purpose of research is to build a model of a system for effective authentication of mobile users based on public data of the user and his behavioral factors as well as to study algorithms for calculating the threshold value at which the authentication of a mobile device user is considered successful.Methods. When analyzing the behavioral factors of a user who needs to be authenticated when interacting with mobile devices, application of the following methods for calculating the threshold value are proposed: dynamic methods for determining the threshold value of user authentication based on the standard deviation and the calculation of the aggregate mean score; the method based on the standard when the system divides the aggregate flow of estimates into several blocks of the same length, where the first block is used for training, and the calculated threshold is used in the second block (this sequence of actions is repeated continuously, that is, the previous block provides training results for calculating the threshold for the current block); a method for calculating the aggregate mean score, where instead of using a single total score as input, the system uses the mean value of the current block, and the new calculated threshold is used as the threshold for decision making for the next block. A mathematical model that balances the speed and reliability of mobile users authentication is proposed.Results. The result of the research is the development of an effective system for calculating the threshold value of successful authentication of a mobile device user based on behavioural features which adapts to changes of the user's behavioural factors. Experimental studies and comparisons with analogs confirming the completeness and correctness were carried out as well as various variants of the proposed solutions.Conclusion. The proposed method of implicit authentication for mobile access control is easy to implement, easy to use, and adaptive to changes in input data. Options for calculating the threshold value at which implicit authentication is considered successful are also proposed.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Shu, Yingli, Quande Yuan, Wende Ke et Lei Kou. « Security Access Control Method for Wind-Power-Monitoring System Based on Agile Authentication Mechanism ». Electronics 11, no 23 (28 novembre 2022) : 3938. http://dx.doi.org/10.3390/electronics11233938.

Texte intégral
Résumé :
With the continuous increase in the proportion of wind power construction and grid connection, the deployment scale of state sensors in wind-power-monitoring systems has grown rapidly with an aim on the problems that the communication authentication process between the wind turbine status sensor and the monitoring gateway is complex and the adaptability of the massive sensors is insufficient. A security access control method for a wind-power-monitoring system based on agile authentication mechanism is proposed in this paper. First, a lightweight key generation algorithm based on one-way hash function is designed. The algorithm realizes fixed-length compression and encryption of measurement data of any length. Under the condition of ensuring security, the calculation and communication cost in the later stage of authentication are effectively reduced. Second, to reduce the redundant process of wind turbine status sensor authentication, an agile authentication model of wind turbine status sensor based on a lightweight key is constructed. Constrained by the reverse order extraction of key information in the lightweight keychain, the model can realize lightweight communication between massive wind turbine status sensors and regional gateways. Finally, the proposed method is compared and verified using the wind turbine detection data set provided by the National New Energy Laboratory of the United States. The experimental results show that this method can effectively reduce the certification cost of a wind-power-monitoring system. Additionally, it can improve the efficiency of status sensor identity authentication and realize the agility and efficiency of the authentication process.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Eaton, Jonathan. « Project headline : Access control and authentication ‐ issues for access to networked information resources ». New Review of Academic Librarianship 4, no 1 (janvier 1998) : 11–17. http://dx.doi.org/10.1080/13614539809516764.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Pu, Li'e, et Jialin Sun. « Face Detection-Induced Access Control System via Large Margin Metric Learning ». International Journal of Distributed Systems and Technologies 13, no 3 (1 juillet 2022) : 1–11. http://dx.doi.org/10.4018/ijdst.307987.

Texte intégral
Résumé :
With the development of science and technology and the acceleration of economic integration, identity authentication has become the most basic element in cyberspace and the basis of the whole information security system. Biometric recognition technology is an important technology in the process of identity authentication. Among them, face recognition technology has been favored by researchers, social applications, and users in the field of identity authentication by virtue of its inherent advantages such as ease of use and insensitivity. In this paper, a face recognition-based access control system is established with the help of large margin metric learning. First, a face library is input into a deep neural network to extract representation features. Second, the deep representation features are used to learn a large margin metric learning model. Third, the face image is captured by a digital camera to input into large margin metric learning model for identifying the person. The experimental results show that the proposed system can accurately identify most of the persons.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Nwogu, Chijioke, Monday Eze et Charles Okunbor. « Design and Implementation of Access Door Control with Mo-bile Alert ». International Journal of Engineering & ; Technology 9, no 2 (7 mai 2020) : 480. http://dx.doi.org/10.14419/ijet.v9i2.30382.

Texte intégral
Résumé :
The necessity for adequate security of lives and properties cannot be overemphasized. Tackling insecurity in an effective manner calls for active computer-based researches and solutions. Essentially a security system is designed to help detect intrusion and prevent unauthorized access. These security threats are tracked by installing various security access doors and alarm systems. Findings have shown that many access doors use either password or biometric form of authentication separately which are easily compromised. This paper presents a two level automated access control for door security with mobile alert system, powered by a 5V, 6000mAH battery. In addition a multi factor authentication using biometrics (fingerprint) and password was also used to enhance access control for this system. A mobile phone call alert and alarm system was uniquely included to this design to notify owners of the presence of an intruder when multiple attempts of incorrect login credentials are presented to the system over a short period of time. The program for the microcontroller was written in C language. This paper concluded that the use of multi factor authentication with mobile phone call alert will help improve the security for access doors used in banks, residential buildings, hospitals, military properties and other institutions and where confidentiality and restrictions are needed.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Satanasaowapak, Pak, Witawat Kawseewai, Suchada Promlee et Anuwat Vilamat. « Residential access control system using QR code and the IoT ». International Journal of Electrical and Computer Engineering (IJECE) 11, no 4 (1 août 2021) : 3267. http://dx.doi.org/10.11591/ijece.v11i4.pp3267-3274.

Texte intégral
Résumé :
This paper presents a residential access control system (RACs) using QR codes and the internet of things (IoT) to improve security and help house owners. The contribution of this paper is that it proposes two mechanisms in the authentication phase and the verification phase, respectively, to enhance residential access control. The main idea is using cryptography between smartphones and access control devices. The cryptography compares secret codes on the key server via the internet. The RACs can notify a user of the residential access status through the LINE application and show the statuses of devices through the network platform for the internet of everything (NETPIE) in real-time. We compare this system’s performance with that of the current access control methods in terms of security and access speed. The results show that this system has more security and has an access speed of 5.63 seconds. Moreover, this system is safer and more flexible than the comparative methods and suitable for contactless authentication.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Hajny, Jan, Petr Dzurenda et Lukas Malina. « Multidevice Authentication with Strong Privacy Protection ». Wireless Communications and Mobile Computing 2018 (29 juillet 2018) : 1–12. http://dx.doi.org/10.1155/2018/3295148.

Texte intégral
Résumé :
Card-based physical access control systems are used by most people on a daily basis, for example, at work, in public transportation, or at hotels. Yet these systems have often very poor cryptographic protection. User identifiers and keys can be easily eavesdropped on and counterfeited. The privacy-preserving features are almost missing in these systems. To improve this state, we propose a novel cryptographic scheme based on efficient zero-knowledge proofs and Boneh-Boyen signatures. The proposed scheme is provably secure and provides the full set of privacy-enhancing features, that is, the anonymity, untraceability, and unlinkability of users. Furthermore, our scheme supports distributed multidevice authentication with multiple RFID (Radio-Frequency IDentification) user devices. This feature is particularly important in applications for controlling access to dangerous sites where the presence of protective equipment is checked during each access control session. Besides the full cryptographic specification, we also show the results of our implementation on devices commonly used in access control applications, particularly the smart cards and embedded verification terminals. By avoiding costly operations on user devices, such as bilinear pairings, we were able to achieve times comparable to existing systems (around 500 ms), while providing significantly higher security, privacy protection, and features for RFID multidevice authentication.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Gajmal, Yogesh M., et Udayakumar R. « Analysis of Authentication based Data Access Control Systems in Cloud ». Journal of Advanced Research in Dynamical and Control Systems 12, no 07-SPECIAL ISSUE (30 juin 2020) : 2961–67. http://dx.doi.org/10.5373/jardcs/v12sp7/20202441.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Stasev, Yu V., I. D. Gorbenko et N. V. Pastukhov. « Authentication in space system communication and control with numerous access ». Kosmìčna nauka ì tehnologìâ 3, no 1-2 (30 janvier 1997) : 83–86. http://dx.doi.org/10.15407/knit1997.01.083.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Chen, Ling. « Research on Role Access Control Model Based on Identity Authentication ». Journal of Physics : Conference Series 2025, no 1 (1 septembre 2021) : 012105. http://dx.doi.org/10.1088/1742-6596/2025/1/012105.

Texte intégral
Résumé :
Abstract Cryptography and access control are the core technologies for a secure operating system. Cryptography can guarantee the confidentiality, integrity, availability and unforgeability of information in the access control system. In the identity-based cryptosystem, the user’s private key is centrally generated by the key distribution center, and key escrow is a major security risk. In view of this problem, it is proposed that multiple trusted entities participate in the key distribution scheme in a serial manner. At the same time, this paper adds a separate blind factor to each user to increase security of the scheme; it also introduces the concept of virtual key, which uses additivity of the key space in the pair-based encryption scheme. In key generation, a timestamp T is added, which enables one-time pad of the system, enhances security of the system, and eliminates collusion attacks by KGC and multiple KPA. Finally, the improved signcryption scheme is combined with the RBAC model, and the I_RBAC model is proposed, which enables identity authentication and information confidentiality of users in simple communication in the RBAC model. Finally, the efficiency and safety of this scheme are analyzed.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Godovnikov, Evgeny A., Anatoliy V. Shicelov et Ruslan T. Usmanov. « Design of physical access control system with integrated wireless authentication ». Yugra State University Bulletin 15, no 2 (10 décembre 2019) : 23–28. http://dx.doi.org/10.17816/byusu20190223-28.

Texte intégral
Résumé :
This article discusses the design of a physical access control system for an enterprise with various methods of authentication and user identification. A review of existing solutions in the design of physical access control systems was conducted. In the course of the work, a system design was proposed, and its components were described in detail.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Wang, Gui Chao, Ai Li Zhang et Yong Zhen Li. « Secure Authentication Protocol of RFID System Based on Access Control ». Advanced Engineering Forum 6-7 (septembre 2012) : 1072–77. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.1072.

Texte intégral
Résumé :
The security and privacy problem of low-cost RFID system is one of the most difficult conundrums in the RFID research field. A protocol based on access control was proposed in this paper, which used the reader access, partial ID, XOR operation, etc. By using of the reader authority distribution method, the unauthorized tag`s information was prevented give-away and it can avoid the lawful reader attack, location privacy attack, etc. Function of the reader was fully used. At the same time, the back-end database`s load and the time of the tag`s answer were reduced. Compared with several traditional security authentication protocols, this protocol is more security, lower energy consumption and more suitable for low-cost RFID system.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Yuanchao Shu, Yu Jason Gu et Jiming Chen. « Dynamic Authentication with Sensory Information for the Access Control Systems ». IEEE Transactions on Parallel and Distributed Systems 25, no 2 (février 2014) : 427–36. http://dx.doi.org/10.1109/tpds.2013.153.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Yen, Sung-Ming, et Chi-Sung Laih. « The design of dynamic access control scheme with user authentication ». Computers & ; Mathematics with Applications 25, no 7 (avril 1993) : 27–32. http://dx.doi.org/10.1016/0898-1221(93)90309-j.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Wu, Wei-Chen, et Yi-Ming Chen. « Improving the Authentication Scheme and Access Control Protocol for VANETs ». Entropy 16, no 11 (19 novembre 2014) : 6152–65. http://dx.doi.org/10.3390/e16116152.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Zhang, Leyou, Yadi Ye et Yi Mu. « Multiauthority Access Control With Anonymous Authentication for Personal Health Record ». IEEE Internet of Things Journal 8, no 1 (1 janvier 2021) : 156–67. http://dx.doi.org/10.1109/jiot.2020.3000775.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Al-Mahmud, Abdullah, et Matei Ciobanu Morogan. « Identity-based Authentication and Access Control in Wireless Sensor Networks ». International Journal of Computer Applications 41, no 13 (31 mars 2012) : 18–24. http://dx.doi.org/10.5120/5602-7858.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
42

Yuan, Hu, Carsten Maple, Yi Lu et Tim Watson. « Peer-assisted location authentication and access control for wireless networks ». Internet Technology Letters 2, no 1 (7 septembre 2018) : e71. http://dx.doi.org/10.1002/itl2.71.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Ferrazani Mattos, Diogo Menezes, et Otto Carlos Muniz Bandeira Duarte. « AuthFlow : authentication and access control mechanism for software defined networking ». Annals of Telecommunications 71, no 11-12 (28 mars 2016) : 607–15. http://dx.doi.org/10.1007/s12243-016-0505-z.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Ding, Yuhang, Yanran Zhang, Bo Qin, Qin Wang, Zihan Yang et Wenchang Shi. « A Scalable Cross-Chain Access Control and Identity Authentication Scheme ». Sensors 23, no 4 (10 février 2023) : 2000. http://dx.doi.org/10.3390/s23042000.

Texte intégral
Résumé :
Cross-chain is an emerging blockchain technology which builds the bridge across homogeneous and heterogeneous blockchains. However, due to the differentiation of different blockchains and the lack of access control and identity authentication of cross-chain operation subjects, existing cross-chain technologies are struggling to accomplish the identity transformation of cross-chain subjects between different chains, and also pose great challenges in terms of the traceability and supervision of dangerous transactions. To address the above issues, this paper proposes a scalable cross-chain access control and identity authentication scheme, which can authenticate the legitimacy of blockchains in the cross-chain system and ensure that all cross-chain operations are carried out by verified users. Furthermore, it will record all cross-chain operations with the help of Superchain in order to regulate and trace illegal transactions. Our scheme is scalable and, at the same time, has low invasiveness to blockchains in the cross-chain system. We implement the scheme and accordingly conduct the evaluations, which prove its security, efficiency, and scalability.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Буяков, К. Е., Д. А. Елизаров, М. Я. Епифанцева, Т. А. Мызникова et А. В. Шилер. « Development of biometric access control system ». Vestnik of Russian New University. Series «Complex systems : models, analysis, management», no 2 (21 juin 2022) : 43–51. http://dx.doi.org/10.18137/rnu.v9187.22.02.p.043.

Texte intégral
Résumé :
Рассмотрены особенности современной архитектуры систем контроля и управления доступом, лучшие практики и тренды в области обеспечения безопасности посредством системы контроля и управления доступом, а также их основные характеристики. Доказана актуальность разработки программно-аппаратного комплекса контроля доступа с использованием биометрической системы аутентификации, основанной на распознавании отпечатков пальцев. Разработанная система обеспечивает гибкую интеграцию с корпоративными сервисами организации. The article discusses the features of the modern architecture of access control systems, best practices and trends in the field of security, as well as the main characteristics. The relevance of the development of a software and hardware complex for access control using a biometric authentication system based on fingerprint recognition. The developed system provides flexible integration with corporate services of the organization.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Wu, Ke He, Hong Jiang Ji, Long Chen et Tong Zhang. « A Trusted Process Security Model for the Access to Power Enterprise Data Center ». Advanced Materials Research 341-342 (septembre 2011) : 472–77. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.472.

Texte intégral
Résumé :
Aiming the lack of the authentication and access control when the business processes of the power business systems visit the enterprise data center, this article proposes a trusted process security model for the access to the power enterprise data center. The model gives the concept of “Trusted Process” firstly, and then builds “Trusted Process List” and the “Process Access List” to convert the business process into trusted process, and finally implements the authentication and access control of the business processes when visiting the data center.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Yu, Linsheng, Mingxing He, Hongbin Liang, Ling Xiong et Yang Liu. « A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services ». Sensors 23, no 3 (22 janvier 2023) : 1264. http://dx.doi.org/10.3390/s23031264.

Texte intégral
Résumé :
Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments. Traditional centralized access control models relying on third party trust face a critical challenge due to a high trust cost and single point of failure. Blockchain can achieve the distributed trust for access control designs in a mutual untrustworthy scenario, but it also leads to expensive storage overhead. Considering the above issues, this work constructed an authentication and authorization scheme based on blockchain that can provide a dynamic update of access permissions by utilizing the smart contract. Compared with the conventional authentication scheme, the proposed scheme integrates an extra authorization function without additional computation and communication costs in the authentication phase. To improve the storage efficiency and system scalability, only one transaction is required to be stored in blockchain to record a user’s access privileges on different service providers (SPs). In addition, mobile users in the proposed scheme are able to register with an arbitrary SP once and then utilize the same credential to access different SPs with different access levels. The security analysis indicates that the proposed scheme is secure under the random oracle model. The performance analysis clearly shows that the proposed scheme possesses superior computation and communication efficiencies and requires a low blockchain storage capacity for accomplishing user registration and updates.
Styles APA, Harvard, Vancouver, ISO, etc.
48

Khan, Abdul Raouf, et Latifa Khalid Alnwihel. « A Brief Review on Cloud Computing Authentication Frameworks ». Engineering, Technology & ; Applied Science Research 13, no 1 (1 février 2023) : 9997–10004. http://dx.doi.org/10.48084/etasr.5479.

Texte intégral
Résumé :
Cloud computing is among the most widely used technologies worldwide as it helps individual users and organizations to store and share information conveniently and cost-effectively. However, data security is a major concern in cloud computing. Security involves guaranteed access to the data only to authorized users and protection against various threats and attacks. Security is generally achieved through the appropriate and efficient implementation of access control, authentication, and authorization mechanisms. Various frameworks have been proposed and implemented for authentication and access control in cloud computing. This paper discusses some of the main authentication frameworks in cloud computing, highlighting their methodologies, algorithms, and problems and identifying the issues that should form the focus of research in the area.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Zhu, Xianwei, ChaoWen Chang, Qin Xi et ZhiBin Zuo. « Attribute-Guard : Attribute-Based Flow Access Control Framework in Software-Defined Networking ». Security and Communication Networks 2020 (10 janvier 2020) : 1–18. http://dx.doi.org/10.1155/2020/6302739.

Texte intégral
Résumé :
Software-defined networking (SDN) decouples the control plane from the data plane, offering flexible network configuration and management. Because of this architecture, some security features are missing. On the one hand, because the data plane only has the packet forwarding function, it is impossible to effectively authenticate the data validity. On the other hand, OpenFlow can only match based on network characteristics, and it is impossible to achieve fine-grained access control. In this paper, we aim to develop solutions to guarantee the validity of flow in SDN and present Attribute-Guard, a fine-grained access control and authentication scheme for flow in SDN. We design an attribute-based flow authentication protocol to verify the legitimacy of the validity flow. The attribute identifier is used as a matching field to define a forwarding control. The flow matching based on the attribute identifier and the flow authentication protocol jointly implement fine-grained access control. We conduct theoretical analysis and simulation-based evaluation of Attribute-Guard. The results show that Attribute-Guard can efficiently identify and reject fake flow.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Singh, Inderpal, et Balraj Singh. « Access management of IoT devices using access control mechanism and decentralized authentication : A review ». Measurement : Sensors 25 (février 2023) : 100591. http://dx.doi.org/10.1016/j.measen.2022.100591.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie