Font Size: a A A

The Research And Implementation Of Login Control For Computing Environment

Posted on:2009-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2178360242998911Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
From the credible system(Trusted System) firstly put out by Anderson to the credible system(Trusted System) of the TCG(Trusted Computing),trusted computing research has more than 30 years history.It focus on fault-tolerant computing,fault detection and the technology of redundant backup early,but today it focus on trusted hardware platforms,trusted software systems and trusted network access.With rapid development of trusted computing technology,people have begun to abandon security protection measures around the network deployment in past,and try to solve the problem of information security in the endpoint.However,due to constraints of academic and industrial,trusted computing PC have not been widely used in the practical applications.Instead,the idea of Trusted Computing used in the general computing platform for security reinforcement is a reliable and effective solution.As the first security checkpoint of computing environment,Login Control of computing environment is on duty of user authentication and access control.This text moves the authentication process of the operating system to the process of BIOS starting,and check the two main certification(USBKEY and BIOS) with the idea of trusted computing intergrity checking to ensure that the authentication process safety.Role-Based Access Control(RBAC) model is one of the advanced security access control methods currently.The process of access control can be divided into two parts:access associated with the role,the role associated with the user.That makes the logic separation of user and access enabled.The access control of user is another task to be completed in Login Control Process.This text applys the model of role-based in the Windows operating system to ensure that system resources and operation are safety.In this paper,the design of Login Control systems based on USBKEY and BIOS and the detailed design of all parts of control systems have been given.The security of the system and the performance have been analyzed in the last.In addition,the detailed design and prototype system implementation of access control of Windows based USBKEY have also been given.
Keywords/Search Tags:Login Control, BIOS, USBKEY, Authentication, Acess Control
PDF Full Text Request
Related items