Font Size: a A A

Design Of Certificate Authentication And Study Of Access Control

Posted on:2007-08-01Degree:MasterType:Thesis
Country:ChinaCandidate:H L SongFull Text:PDF
GTID:2178360215970276Subject:Mathematics
Abstract/Summary:PDF Full Text Request
Identity verification and access control are two critical problems in the security application sys-tems.It is the best way to provide identification service by building certificate authentication system based on PKI.We study the critical problem of certificate authentication design,and then present an in-tegrated solving scheme.Beside authentication,we also have considered the efficiency of the scheme. How to make legal users access resources quickly,and illegal users be found out quickly?Then it comes with the access control problem.This problem maybe met in remote access control,and we present an remote access control scheme based on Usb-Keys.This scheme responds for multi-server environments.To protect users' intimate information,the article brings forword to an role-based anony-mous access control combined with visual cryptography.Then the latter of the article can be divided into three parts:In the first part,a remote access control scheme is introduced.It is using Usb-Keys as memory medium and applies RSA public-key cryptography and HASH function to realize autho-rization and verification.In the second part,an anonymous access control scheme based on roles and visual cryptography is introduced.It realizes anonymity by adding a role assignment agent to orig-inal RBAC model.Legal users can log into systems and operating their assigned resources without exposing intimate information.In the third part,a design scheme of certificate authentication is in-treduced,including the analysis of certificate authentication logic structure,security protocols,related standards and whole structure and so on.
Keywords/Search Tags:PKI, RBAC, Public-Key Cryptography, Digital Certificate, Visual Cryptography
PDF Full Text Request
Related items