Font Size: a A A

Centralized Authentication Management System Based On Employee Smart Card Research And Applications

Posted on:2008-07-23Degree:MasterType:Thesis
Country:ChinaCandidate:D F LiFull Text:PDF
GTID:2208360212987469Subject:Business Administration
Abstract/Summary:PDF Full Text Request
With the development of the social informationization, more attentions should be paid to the application security for satisaifying the requirement of E-Government, E-Commerce and enterprise informationization. Therefore, application security would become new business growth point of IT industry. And identity authentication; privilege management and access control are most important contents in the application security. So they also become the focus in the field of the information security.In traditional application system, the user' s access control is realized through the user name and user password. The right control is completed by every application system separately. Each application system manages and protects its own resource by its own. There are many potential problems in this mode. At same time, every part in the system has the different security design and operating policy. They create many different policies for the privilege control in one organization. It leads to the low efficiency, complex management and weak security.This article would point out a new framework of security management and access control; aim to solve the problem of authentication, privilege management and access control. Based on the concentrated management of user' s intelligent cards, the authentication system could groups the e-mail system, database, web servers and other application systems into an integrated platform. Concentrated authentication system could achieve the management of user's privilege and identity; increases the integrity, secrecy and consistency of the distributed system. A perfect concentrated verification system should have the ability to ensure the design of an application system meet the demand on security; normalize the construction of them; and then, reach the target that all systems have the one security standard.
Keywords/Search Tags:Authentication, Privilege Management, Access Control
PDF Full Text Request
Related items