Font Size: a A A

Design And Research In RBAC-BASED PMI System

Posted on:2008-11-26Degree:MasterType:Thesis
Country:ChinaCandidate:D B HuangFull Text:PDF
GTID:2178360215469889Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
In information technology rapid development today, both enterprise and individual are enjoying the convenience which the information technology brings, while the information technology brings the convenience, the following security problem is also more prominent, the information and the network security will become more and more important. Identity authentication, Privileges and network access control has become an important part of the two studies, is the current hot topic of research in the field of information security. Today, Web-based information system becomes increasingly larger in size, more complex business logic, In particular, visitors to the distribution of resources, arbitrariness and uncertainty make service providers can not be determined in advance the role of features and user access rights. Such a high level of operational safety systems, authentication and access control security system is the most important way. At present, PKI(Public Key Infrastructure) technology mainly used for authentication of users, it is for service providers to prove the identity of users visit.; And access control is used PMI (Privilege Management Infrastructure) technology, which is based on PKI, providing power management and authorization services for users and applications. PMI-based access control model in the large-scale enterprise applications by increasing people's attention. particularly in the context of RBAC control policy. This paper presents a PMI access control model which is based on role and attribute certificates, The model of the certification process based on the PKI identity certificate. using attribute certificates to achieve the link between users and Privileges , are very suitable for large-scale enterprise application. also more fine-grained access control can be realized.
Keywords/Search Tags:Access control, Privilege management infrastructure(PMI), RBAC, Public-key certificate, Attribute certificate
PDF Full Text Request
Related items