Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2020 ( 29 )

2019 ( 1358 )

2018 ( 20773 )

2017 ( 21606 )

Custom range...

Search Results: 1 - 10 of 350298 matches for " Privileges Management Infrastructure(PMI)<br>生物认证 "
All listed articles are free for downloading (OA Articles)
Page 1 /350298
Display every page Item
Research on the Telebiometric Authentication System Based on PKI and PMI

Xin Yang,Wei Jing-zhi,Li Chao,Yang Yi-xian,

电子与信息学报 , 2008,
Abstract: The biometric technologies for user authentication have been applied widely to identity authentication fields. But at present, the result of research on a biometric authentication system which is used for open networks has not been found. Identity authentication based on X.509 Public Key Infrastructure(PKI) and Privileges Management Infrastructure(PMI) are used widely and effectively in open network fields for authentication and privileges management. So on the basement of PKI and PMI technology, with the function of identity authentication and privileges management, the currency biometric identity authentication system based on Biometric Certificate is introduced. Finally, by designing a highly secure biometric smart card which can realize identity authentication and privileges management, proved the ability and operation of the currency biometric identity authentication system based on PKI and PMI technology.
Design and implementation of an attribute authority system

LIU Xin-tao,CAO Yuan-da,

计算机应用 , 2007,
Abstract: This paper has described the design and implementation of an Attribute Authority system,which is composed of "AB AA system","AB ARA system" and "AB directory system".The Attribute Authority system is responsible for signing and issuing a tribute certificates,and other management functionalities.
A Design Scheme of PMI Applied in Web Access Control

JIANG Ya-li,SHI Feng,

计算机应用研究 , 2004,
Abstract: With the development of E-business and E-government in our country,there is nothing that can take place of the status and effect of the network.At the same time,to solve the new problem of identity authentication and privilege control become more and more important.Under this condition,as a new kind of information security infrastructure,Privilege Management Infrastructure (PMI) is developed.The function and framework of PMI is introduced.One design scheme of PMI system RBAC/Web which is applied in role-based access control in Web is described in detail.Furthermore,the security of the RBAC/Web system is analyzed.
Research on Access Control in Multi-domain & Multi-application Environment

HONG Fan,DUAN Su-Juan,

计算机科学 , 2006,
Abstract: According to the security requirements in multi-domain & multi-application environment,an access control model called DPM (Distributed Privilege Model)is presented by adding application aspect into RBAC96 model and in- troducing global role,domain role and correlation role concept.Through extending PMI(Privilege Management Infra- structure),DPM model is realized.In conclusion,it proposes a practical scheme for the authorization and privilege management in multi-application and multi-domain context.
Application of PMI technology in enterprise''''s privilege management


计算机应用 , 2005,
Abstract: The PMI has been recommended as a new information protection infrastructure, to provide privilege management service and to get an access control mechanism which is fit for most of actual transact patterns and free of the development and management of concrete applications. The advantages of using PMI technology instead of applicationembedded privilege management as before were introduced in distributed Web applications. The possibility of its realization was discussed and the scheme of its realization was proposed.
Dynamic authorization scheme based on delegation in distributed system

ZHANG Run-lian,WU Xiao-nian,DONG Xiao-sheSchool of Electronic,Information Engineering,Xi'an Jiaotong University,Xi'an Shaanxi,China,School of Information,Communication,Guilin University of Electronic Technology,Guilin Guangxi,National Laboratory for Modern Communication,Chengdu Sichuan,

计算机应用 , 2008,
Abstract: Concerning the authority in distributed environment for collaboration, a dynamic authorization scheme was presented based on delegation and RBAC model. The scheme supports partial role delegation, by expanding element sets of RBAC model, enlarging static authorization operations, and allowing the delegator to create temporary delegation roles and assign others (the delegatee) to the particular roles. The scheme was implemented by three-level frameworks, and the operating process about how to authorize dynamically in delegation model was described. The application shows that the scheme can adapt to distributed and dynamic environment, and follow the least privilege principle.
Analysis of the Security of Machine Readable Travel Documents

ZHU Xin-Shan,GAO Yong,WANG Yang-Sheng,

计算机科学 , 2005,
Abstract: The new authentication system adopts biometrie verification technologies. And the security of Mrtds with bi- ometric information is an extremely important problem. In this paper, we first analyze the implicit menaces to data of machine readable zone in Mrtds and conclude the suggested system security scheme, i. e., PKI digital signature by ICAO. Based on these, we consider the authentication of Mrtds as the links among the following four elements, the protected data, the corresponding hash value and digital signature, and the holder. To the technologies used in each link that is PKI, digital signature and biometrics, we propose some additional requirements and security characters. So that the improved system reinforces each link in the system and the greater system security level is reached.
Research of PKI Secure Certification Architecture

ZHANG Shi-bin,HE Da-ke,DAI Qun,

计算机应用研究 , 2005,
Abstract: As a kind of secure infrastructure, PKI can offer many kinds of security service according to different security demands to different users, mainly including authentication, data integrality, data privacy, getting undeniable, security time stamp and access control, etc. The service of secure certification merges mai n technology of above-mentioned service adopted to serve, become the main means to guarantee the network with safe information gradually. This paper has studied PKI secure certification architecture model emphatically on the basis of analysing about existing PKI certification architecture, put forward national-level PK I secure certification architecture.
A New Accessing and Storing Private Key Scheme

PAN Heng,XU Bin,ZHU Yue-fei,

计算机应用研究 , 2005,
Abstract: To build an effective Public Key Infrastructure (PKI), a secure way of accessing and storing the users' private keys is very essential. The present paper proposes a new, secure scheme based on GQ(Guillou-Quisquater) identification scheme. It can not only corroborate the identity of a private key owner but enhance the confidentiality of the private key storage as well. The users' encrypted private keys are stored at Certificate Authority (CA). In order to avoid the different types of malicious attacks and to ensure the minimum information leak during the authentication process, the GQ identification scheme is used so that only the legal user can be verified and get his private key. In addition, to enhance the confidentiality of the private key storage and transmission, as soon as the legal user finishes using the private key, a new protective key will be reproduced. The private key encrypted by the new protective key will then be transmitted to CA again.
Risk Management and Marketing Strategic Analysis on China's Organic Certification

谭俊杰, 罗璇
Management Science and Engineering (MSE) , 2016, DOI: 10.12677/MSE.2016.51B002


This paper aims to propose strategies in agriculture certification management and branding in order for organic agriculture risk management. The interpretation of China’s organic product certification mechanism indicates that the risk in early of the organic certification application process includes pest control, weed control, insect control, cost control, as well as marketing management. Through analysis of China’s agriculture certification mechanism and consumer behavior, a multi-certificates strategy is proposed in order for reduce the risk in the early stage, and another product line extension and brand extension strategies are proposed in order for boosting up the new entrant organic product’s market performance.

Page 1 /350298
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.