Using Virtualization Technology for the User Authorization System

被引:2
|
作者
Polenov, Maxim [1 ]
Guzik, Vyacheslav [1 ]
Lukyanov, Vladislav [1 ]
机构
[1] Southern Fed Univ, Dept Comp Engn, Taganrog, Russia
关键词
Virtualization; Wireless network; Authorization system; Database; Virtual machine; Server;
D O I
10.1007/978-3-319-57141-6_20
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper deals with the use of virtualization technology for the development of software system that supports authorization of Wi-Fi networks users. The suggested approach is to use two databases of operators and users, implemented on MySQL, and two subsystems of registration and authorization to be placed on a virtual machine. The paper presents the organization and a general algorithm of the authorization system operation, as well as the load analysis of server with the authorization system. Here considered the graph of hardware resources loads used by the virtual machine. Using the hypervisor allows changing the configuration and provides the possibility to monitor the virtual machine, the necessary disk space, the memory consumption and CPU usage.
引用
收藏
页码:192 / 200
页数:9
相关论文
共 50 条
  • [21] Rule Based Authorization Management Using User Context and ROLE
    Ahn, SungWook
    Rhew, SungYul
    CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, 2012, 310 : 172 - 179
  • [22] User-Friendly Authentication and Authorization Using a Smartphone Proxy
    Roalter, Luis
    Diewald, Stefan
    Moeller, Andreas
    Stockinger, Tobias
    Kranz, Matthias
    COMPUTER AIDED SYSTEMS THEORY, PT II, 2013, 8112 : 390 - 399
  • [23] INTRODUCING A VIRTUALIZATION TECHNOLOGY FOR THE FTU PLASMA CONTROL SYSTEM
    Fiasca, L.
    Boncagni, L.
    Centioli, C.
    Iannone, F.
    Panella, M.
    Vitale, V.
    Zaccarian, L.
    FUSION SCIENCE AND TECHNOLOGY, 2009, 56 (02) : 994 - 997
  • [24] Utilizing the Virtualization Technology in Computer Operating System Teaching
    Fan Yile
    PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 885 - 888
  • [25] User Authorization at the Molecular Scale
    Lustgarten, Omer
    Motiei, Leila
    Margulies, David
    CHEMPHYSCHEM, 2017, 18 (13) : 1678 - 1687
  • [26] Software performance testing scheme using Virtualization technology
    Kim, Gwang-hun
    Moon, Hui-choun
    Song, Gi-pyeung
    Shin, Seok-Kyu
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 439 - 443
  • [27] A study on attack information collection using virtualization technology
    Yang, Hwan-Seok
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (20) : 8791 - 8799
  • [28] A study on attack information collection using virtualization technology
    Hwan-Seok Yang
    Multimedia Tools and Applications, 2015, 74 : 8791 - 8799
  • [29] IP traffic generator using container virtualization technology
    Fujdiak, Radek
    Uher, Vaclav
    Mlynek, Petr
    Blazek, Petr
    Slacik, Jan
    Misurec, Jiri
    Volkova, Marina
    Chmelar, Petr
    Sedlacek, Vladimir
    2018 10TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT 2018): EMERGING TECHNOLOGIES FOR CONNECTED SOCIETY, 2018,
  • [30] Correspondent authorization in the GSM telephony using watermarking technology
    Gajewski, Piotr
    Piotrowski, Zbigniew
    2006 EUROPEAN CONFERENCE ON WIRELESS TECHNOLOGIES, 2006, : 150 - +