• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2011, Vol. 33 ›› Issue (9): 24-28.

• 论文 • Previous Articles     Next Articles

Research on User’s Rights Control Technology Based on Authentication Trustworthiness

WEI Lifeng,DING Yan,CHEN Songzheng,HE Lianyue   

  1. (School of Computer Science,National University of Defense Technology,Changsha 410073,China)
  • Received:2009-09-01 Revised:2009-12-08 Online:2011-09-25 Published:2011-09-25

Abstract:

Authentication trustworthiness reflects the degree of trustworthiness of the user who has passed system authentication. Based on authentication trustworthiness, logging in  is restricted, user’s role and role’s mandatory access control rights are restricted, and then the user’s rights control technology is proposed. Combing authentication trustworthiness with accessing systems, it requests that the user must have some authentication trustworthiness when he wants to access a system, and the important user must pass an important identity authentication mechanism. Applying authentication trustworthiness to RBA(Role Based Authorization), it can decide which role can be activated by the user, and also can decide what rights can be activated by the active role of the user, and reflects on every mandatory access control policy, it implements the unification of authentication and access authorization, solves the problem of improper right obtaining. Finally, more contents to be studied are pointed out.

Key words: authentication trustworthiness;mandatory access control;role based authorization;access authorization