oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 29 )

2019 ( 1358 )

2018 ( 20773 )

2017 ( 21606 )

Custom range...

Search Results: 1 - 10 of 350298 matches for " Privileges Management Infrastructure(PMI)<br>生物认证 "
All listed articles are free for downloading (OA Articles)
Page 1 /350298
Display every page Item
Research on the Telebiometric Authentication System Based on PKI and PMI
基于PKI和PMI的生物认证系统研究

Xin Yang,Wei Jing-zhi,Li Chao,Yang Yi-xian,
辛阳
,魏景芝,李超,杨义先

电子与信息学报 , 2008,
Abstract: The biometric technologies for user authentication have been applied widely to identity authentication fields. But at present, the result of research on a biometric authentication system which is used for open networks has not been found. Identity authentication based on X.509 Public Key Infrastructure(PKI) and Privileges Management Infrastructure(PMI) are used widely and effectively in open network fields for authentication and privileges management. So on the basement of PKI and PMI technology, with the function of identity authentication and privileges management, the currency biometric identity authentication system based on Biometric Certificate is introduced. Finally, by designing a highly secure biometric smart card which can realize identity authentication and privileges management, proved the ability and operation of the currency biometric identity authentication system based on PKI and PMI technology.
Design and implementation of an attribute authority system
一种属性权威系统的设计与实现

LIU Xin-tao,CAO Yuan-da,
刘欣桃
,曹元大

计算机应用 , 2007,
Abstract: This paper has described the design and implementation of an Attribute Authority system,which is composed of "AB AA system","AB ARA system" and "AB directory system".The Attribute Authority system is responsible for signing and issuing a tribute certificates,and other management functionalities.
A Design Scheme of PMI Applied in Web Access Control
应用于Web访问控制的PMI的一种构建方案*

JIANG Ya-li,SHI Feng,
蒋亚丽
,石峰

计算机应用研究 , 2004,
Abstract: With the development of E-business and E-government in our country,there is nothing that can take place of the status and effect of the network.At the same time,to solve the new problem of identity authentication and privilege control become more and more important.Under this condition,as a new kind of information security infrastructure,Privilege Management Infrastructure (PMI) is developed.The function and framework of PMI is introduced.One design scheme of PMI system RBAC/Web which is applied in role-based access control in Web is described in detail.Furthermore,the security of the RBAC/Web system is analyzed.
Research on Access Control in Multi-domain & Multi-application Environment
多域多应用环境下的访问控制研究

HONG Fan,DUAN Su-Juan,
洪帆
,段素娟

计算机科学 , 2006,
Abstract: According to the security requirements in multi-domain & multi-application environment,an access control model called DPM (Distributed Privilege Model)is presented by adding application aspect into RBAC96 model and in- troducing global role,domain role and correlation role concept.Through extending PMI(Privilege Management Infra- structure),DPM model is realized.In conclusion,it proposes a practical scheme for the authorization and privilege management in multi-application and multi-domain context.
Application of PMI technology in enterprise''''s privilege management
授权管理基础设施技术在企业权限管理中的应用

ZHANG Li,XU Jin,
张丽
,徐进

计算机应用 , 2005,
Abstract: The PMI has been recommended as a new information protection infrastructure, to provide privilege management service and to get an access control mechanism which is fit for most of actual transact patterns and free of the development and management of concrete applications. The advantages of using PMI technology instead of applicationembedded privilege management as before were introduced in distributed Web applications. The possibility of its realization was discussed and the scheme of its realization was proposed.
Dynamic authorization scheme based on delegation in distributed system
基于委托的分布式动态授权策略

ZHANG Run-lian,WU Xiao-nian,DONG Xiao-sheSchool of Electronic,Information Engineering,Xi'an Jiaotong University,Xi'an Shaanxi,China,School of Information,Communication,Guilin University of Electronic Technology,Guilin Guangxi,National Laboratory for Modern Communication,Chengdu Sichuan,
张润莲
,武小年,董小社

计算机应用 , 2008,
Abstract: Concerning the authority in distributed environment for collaboration, a dynamic authorization scheme was presented based on delegation and RBAC model. The scheme supports partial role delegation, by expanding element sets of RBAC model, enlarging static authorization operations, and allowing the delegator to create temporary delegation roles and assign others (the delegatee) to the particular roles. The scheme was implemented by three-level frameworks, and the operating process about how to authorize dynamically in delegation model was described. The application shows that the scheme can adapt to distributed and dynamic environment, and follow the least privilege principle.
Analysis of the Security of Machine Readable Travel Documents
机器可读旅行文档的安全分析

ZHU Xin-Shan,GAO Yong,WANG Yang-Sheng,
朱新山
,高勇,王阳生

计算机科学 , 2005,
Abstract: The new authentication system adopts biometrie verification technologies. And the security of Mrtds with bi- ometric information is an extremely important problem. In this paper, we first analyze the implicit menaces to data of machine readable zone in Mrtds and conclude the suggested system security scheme, i. e., PKI digital signature by ICAO. Based on these, we consider the authentication of Mrtds as the links among the following four elements, the protected data, the corresponding hash value and digital signature, and the holder. To the technologies used in each link that is PKI, digital signature and biometrics, we propose some additional requirements and security characters. So that the improved system reinforces each link in the system and the greater system security level is reached.
Research of PKI Secure Certification Architecture
PKI安全认证体系的研究

ZHANG Shi-bin,HE Da-ke,DAI Qun,
张仕斌
,何大可,代群

计算机应用研究 , 2005,
Abstract: As a kind of secure infrastructure, PKI can offer many kinds of security service according to different security demands to different users, mainly including authentication, data integrality, data privacy, getting undeniable, security time stamp and access control, etc. The service of secure certification merges mai n technology of above-mentioned service adopted to serve, become the main means to guarantee the network with safe information gradually. This paper has studied PKI secure certification architecture model emphatically on the basis of analysing about existing PKI certification architecture, put forward national-level PK I secure certification architecture.
A New Accessing and Storing Private Key Scheme
一种新的私钥安全存取方案*

PAN Heng,XU Bin,ZHU Yue-fei,
潘恒
,徐斌,祝跃飞

计算机应用研究 , 2005,
Abstract: To build an effective Public Key Infrastructure (PKI), a secure way of accessing and storing the users' private keys is very essential. The present paper proposes a new, secure scheme based on GQ(Guillou-Quisquater) identification scheme. It can not only corroborate the identity of a private key owner but enhance the confidentiality of the private key storage as well. The users' encrypted private keys are stored at Certificate Authority (CA). In order to avoid the different types of malicious attacks and to ensure the minimum information leak during the authentication process, the GQ identification scheme is used so that only the legal user can be verified and get his private key. In addition, to enhance the confidentiality of the private key storage and transmission, as soon as the legal user finishes using the private key, a new protective key will be reproduced. The private key encrypted by the new protective key will then be transmitted to CA again.
中国有机农产品认证的风险管理和营销策略分析
Risk Management and Marketing Strategic Analysis on China's Organic Certification
 [PDF]

谭俊杰, 罗璇
Management Science and Engineering (MSE) , 2016, DOI: 10.12677/MSE.2016.51B002
Abstract:

本文解读了中国有机产品认证流程,并分析出有机农产品生产者在产品认证初期,尤其是转换期,所面临的来自生产加工和市场销售两大环节主要风险,这包括了病虫草害控制、成本价格控制、以及营销管理三个方面。结合当下中国农产品认证体系的分析,以及对目标消费者行为的判断,本文提出了转换期产品认证多样化以及产品线延伸或品牌延伸的品牌战略,从而降低国内有机农产品认证的风险并提升产品市场营销表现。

This paper aims to propose strategies in agriculture certification management and branding in order for organic agriculture risk management. The interpretation of China’s organic product certification mechanism indicates that the risk in early of the organic certification application process includes pest control, weed control, insect control, cost control, as well as marketing management. Through analysis of China’s agriculture certification mechanism and consumer behavior, a multi-certificates strategy is proposed in order for reduce the risk in the early stage, and another product line extension and brand extension strategies are proposed in order for boosting up the new entrant organic product’s market performance.


Page 1 /350298
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.