Abstract | ||
---|---|---|
In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions... Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication trustworthiness model. The model firstly calculates the trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication trustworthiness under multiple authentication rules. By comparing user's authentication trustworthiness with system access trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/PRDC.2005.54 | PRDC |
Keywords | Field | DocType |
message authentication,fuzzy logic | Data mining,Challenge-Handshake Authentication Protocol,Authentication,Message authentication code,Challenge–response authentication,Computer science,Computer security,Fuzzy logic,Data Authentication Algorithm,Authentication protocol,Multi-factor authentication,Distributed computing | Conference |
Volume | Issue | ISBN |
2005 | null | 0-7695-2492-3 |
Citations | PageRank | References |
0 | 0.34 | 5 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Lunwei Wang | 1 | 0 | 0.34 |
Lianyue He | 2 | 0 | 0.68 |
Xiangke Liao | 3 | 622 | 74.79 |
Wang Huaimin | 4 | 1025 | 121.31 |