Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang
{"title":"基于控制标志的加权认证可信度模型研究","authors":"Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang","doi":"10.1109/PRDC.2005.54","DOIUrl":null,"url":null,"abstract":"In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication trustworthiness model. The model firstly calculates the trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication trustworthiness under multiple authentication rules. By comparing user's authentication trustworthiness with system access trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.","PeriodicalId":123010,"journal":{"name":"Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on Control Flags-based Weighted Authentication Trustworthiness Model\",\"authors\":\"Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang\",\"doi\":\"10.1109/PRDC.2005.54\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication trustworthiness model. The model firstly calculates the trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication trustworthiness under multiple authentication rules. By comparing user's authentication trustworthiness with system access trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.\",\"PeriodicalId\":123010,\"journal\":{\"name\":\"Pacific Rim International Symposium on Dependable Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Pacific Rim International Symposium on Dependable Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PRDC.2005.54\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Pacific Rim International Symposium on Dependable Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PRDC.2005.54","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research on Control Flags-based Weighted Authentication Trustworthiness Model
In this paper, weighted factors are given to authentication rules to express their importance, and the control flags are given to multiple authentication rules to express their stack relationship and reflect their effect on the authentication conclusions. Based on the research on weighted model in fuzzy logic, this paper puts forwards the control flags-based weighted authentication trustworthiness model. The model firstly calculates the trustworthiness of a single weighted authentication rule, then, according to the control flags corresponding to each authentication rule, calculates the user's authentication trustworthiness under multiple authentication rules. By comparing user's authentication trustworthiness with system access trustworthiness threshold, the system forms the final authentication conclusion. The model describes the uncertainties in authentication system comprehensively, and enhances the security under multiple authentication rules.