Design and Analysis of Network Security Access Control System

被引:0
|
作者
Wang, Liang [1 ]
机构
[1] Sichuan TOP IT Vocat Inst, Chengdu 611743, Peoples R China
来源
2019 3RD INTERNATIONAL CONFERENCE ON DATA SCIENCE AND BUSINESS ANALYTICS (ICDSBA 2019) | 2019年
关键词
big data environment; web network security; PKI/CA module; access control; security isolation; authentication; /; authorization; system design;
D O I
10.1109/ICDSBA48748.2019.00092
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The common web network security access control system can not reduce the average response time and the average login time with the number of concurrent users increasing. In order to solve this problem, a web network security access control system based on big data is designed. Through the web three network security architecture design, the PKI/CA system module design under the big data environment, and the network security isolation module design, the system hardware has been designed. Through the system database design, the centralized authentication / authorization module design, and the secure access control server design, the system software is designed. The experiment results show that the average response time and the average login time of users are effectively controlled after the application of the web network access control system based on big data.
引用
收藏
页码:426 / 429
页数:4
相关论文
共 50 条
  • [31] Single sign-on and access control for network security service
    Kim, T
    Roh, JH
    Choi, D
    Cho, Y
    Jin, S
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 357 - 360
  • [32] Research on the access control system for ammunition depot security
    Li Jixiang
    Zhao Fuquan
    Proceedings of the First International Symposium on Test Automation & Instrumentation, Vols 1 - 3, 2006, : 1722 - 1725
  • [33] High Security Entrance Access Control System Design Using ISO 14443-A Standard
    Wang, Deming
    Ding, Yanyu
    Hu, Jianguo
    Tan, Hongzhou
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 357 - +
  • [34] Design of access control system considering usability and security - Application of vital sign sensing technology
    Fujikawa, Masaki
    Doi, Hiroshi
    Proceedings of the ISA/IEEE 2005 Sensors for Industry Conference, 2005, : 15 - 21
  • [35] Design of network security early warning system
    Ye Yalin
    Yan Lina
    Zhang Qian
    Yuan Quan
    Xu Yang
    2016 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA & SMART CITY (ICITBS), 2017, : 432 - 435
  • [36] A network security system model - design and implementation
    Luo, J
    Liu, Y
    Amin, N
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON GEARING, TRANSMISSIONS, AND MECHANICAL SYSTEMS, 2000, : 413 - 423
  • [37] Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security Analysis
    Patzer, Florian
    Beyerer, Juergen
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 550 - 557
  • [38] A security quantitative analysis method for access control based on security entropy
    Che, Tian-Wei
    Ma, Jian-Feng
    Li, Na
    Wang, Chao
    International Journal of Network Security, 2015, 17 (05): : 517 - 521
  • [39] A design of an access control model for multilevel-security documents
    Alhammouri, Mohammad
    Muftic, Sead
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1476 - +
  • [40] Development of committee neural network for computer access security system
    Anagun, AS
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 3, 2006, 3982 : 11 - 20