Design and Analysis of Network Security Access Control System

被引:0
|
作者
Wang, Liang [1 ]
机构
[1] Sichuan TOP IT Vocat Inst, Chengdu 611743, Peoples R China
来源
2019 3RD INTERNATIONAL CONFERENCE ON DATA SCIENCE AND BUSINESS ANALYTICS (ICDSBA 2019) | 2019年
关键词
big data environment; web network security; PKI/CA module; access control; security isolation; authentication; /; authorization; system design;
D O I
10.1109/ICDSBA48748.2019.00092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The common web network security access control system can not reduce the average response time and the average login time with the number of concurrent users increasing. In order to solve this problem, a web network security access control system based on big data is designed. Through the web three network security architecture design, the PKI/CA system module design under the big data environment, and the network security isolation module design, the system hardware has been designed. Through the system database design, the centralized authentication / authorization module design, and the secure access control server design, the system software is designed. The experiment results show that the average response time and the average login time of users are effectively controlled after the application of the web network access control system based on big data.
引用
收藏
页码:426 / 429
页数:4
相关论文
共 50 条
  • [21] Security management architecture for access control to network resources
    Kumar, GP
    Venkataram, P
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (06): : 362 - 370
  • [22] Security management architecture for access control to network resources
    Indian Inst of Science, Bangalore, India
    IEE Proc Comput Digital Tech, 6 (362-370):
  • [23] Block Access Control in Wireless Blockchain Network: Design, Modeling and Analysis
    Li, Yixin
    Cao, Bin
    Liang, Liang
    Mao, Deming
    Zhang, Lei
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (09) : 9258 - 9272
  • [24] ACCESS-CONTROL AND SECURITY FOR A DISTRIBUTED CONTROL-SYSTEM
    MEYER, J
    GOTZ, A
    KLOTZ, WD
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION A-ACCELERATORS SPECTROMETERS DETECTORS AND ASSOCIATED EQUIPMENT, 1994, 352 (1-2): : 289 - 292
  • [25] Security analysis of Mandatory Access Control Model
    Jiang, YX
    Lin, CC
    Yin, H
    Tan, ZX
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
  • [26] Security Analysis and Improvement of Femtocell Access Control
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Tso, Raylin
    Wu, Mu-En
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 223 - 232
  • [27] Computer security economics based on risk analysis of multilevel authentication design for access control
    Gaol, Ford Lumban
    WSEAS Transactions on Information Science and Applications, 2011, 8 (11): : 417 - 429
  • [28] Design of Network Security Defense System for Information System
    Li, Kexin
    Xia, Hongsen
    Zhong, Ling
    PROCEEDINGS OF ANNUAL CONFERENCE OF CHINA INSTITUTE OF COMMUNICATIONS, 2010, : 301 - 303
  • [29] Design of adaptive access network and control protocol
    Nakagawa, H
    Kazunari, I
    Ohta, N
    ECUMN '2000: 1ST EUROPEAN CONFERENCE ON UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2000, : 151 - 157
  • [30] Design of Intelligent Access Control System
    Meng Xiang
    Liang Yingchun
    ISTM/2011: 9TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, 2011, : 363 - 365