Digital Tiger Symbol Authorization Method Based on PKI System
DOI: 10.23977/cpcs.2023.070112 | Downloads: 12 | Views: 653
Author(s)
Yanhang Chai 1, Wen Li 1, Wentao Zhang 2, Wei Bai 1
Affiliation(s)
1 Army Engineering University of PLA, Nanjing, Jiangsu, 210007, China
2 School of Software, Liaoning Technical University, Fuxin, Liaoning, 123032, China
Corresponding Author
Wen LiABSTRACT
Under modern high-tech conditions, the importance of personnel authorization security is increasingly prominent. A set of safe authorization method can ensure that human resources are properly distributed to each unit, thus providing reliable guarantee for the successful completion of tasks. However, current personnel authorization are still paper-based or verbal, prone to errors or inconsistencies, and difficult to verify. In this paper, a method of digital Tiger Mark authorization based on PKI system is proposed, using modern cryptography technology to provide support for the security and reliability of personnel authorization. This method realizes fine authorization, and the authorization can be verified. The method uses digital certificates to assign people's identities to their respective roles, and uses encryption algorithms to enforce access control policies and prevent unauthorized access. The feasibility of this method is verified by us in a simulated cross-domain task environment.
KEYWORDS
PKI, digital tiger symbol, fine-grained authorization, digital certificate, cryptographyCITE THIS PAPER
Yanhang Chai, Wen Li, Wentao Zhang, Wei Bai, Digital Tiger Symbol Authorization Method Based on PKI System. Computing, Performance and Communication Systems (2023) Vol. 7: 99-104. DOI: http://dx.doi.org/10.23977/cpcs.2023.070112.
REFERENCES
[1] Dong Z. G., (2021) Research on the Implementation of Network Communication Security Based on PKI. Electronic Technology & Software Engineering, (20): 241-242.
[2] He S., (2013) Design and Implementation of Multi-domain Unified Authentication and Authorization System Based on PKI. Beijing: Beijing University of Posts and Telecommunications: 2-3.
[3] Wu B., (2008) Research and Implementation of Unified Authentication and Authorization System Based on PKI. Hubei: Wuhan University of Technology, 13-16.
[4] Luo Y., (2021) A Brief Discussion on the Design and Implementation of Unified Identity Authentication Technology Based on PKI. Yunnan Science and Technology Management, (10): 62-64.
[5] Li S. M., (2022) Research on Hospital Electronic Archives Security Management System Based on PKI Technology. Information Technology, (09): 16-18.
Downloads: | 2390 |
---|---|
Visits: | 116897 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Journal of Artificial Intelligence Practice
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks