Security Strategy Research and Design Based on Agency Identity Authentication

Article Preview

Abstract:

The application of LAN in enterprises has become wider and wider, it brings efficiency and convenience to management and production, but at the same time, security threat is increasing. This threat is influenced by the factors such as network environment, network management and the level of the staff. Therefore it causes the realization of LAN security strategic planning is not entirely reliable, reflecting mainly in the subjective factors such as network user identity authentication. Through research, on the basis of the application of Single Sign-On technology and introducing the agency identity authentication system, a new security strategy is built up, which can improve the whole LAN security.

You have full access to the following eBook

Info:

Periodical:

Pages:

843-847

Citation:

Online since:

September 2012

Authors:

Export:

Share:

Citation:

[1] Yongxiang, Xu. Unified User Managment System Design[J]. Computer Engineering, 2003, 29(5): 120- 123.

Google Scholar

[2] Manshan, lin, Heqing, Guo. SSO Technology Situation and Development[J]. Computer Application, 2004, 24(6): 248- 250.

Google Scholar

[3] Wei, Han, Zhihua, Fan. Application Research of SSO Technology in Web Service based on SAML[J]. Computer Engineering and Design, 2005, 26.

Google Scholar

[4] Ting, Zhang, Jixiu, Geng. SSO Implementation Patterns Research in Web[J]. Computer Simulation, 2005, 2.

Google Scholar

[5] Shenlu, Lai, Xin, Li, Chuan, Jun. Pluggable SSO Technology Application[J]. Computer Engineering. 2008(14).

Google Scholar

[6] Xiaohui, Zhou. Solution of Cross-domain SSO based on Digital Certificate[J]. Journal of Changchun University of Technology (Nature Science). 2010(06).

Google Scholar

[7] Dazhi, Li, Sihan, Qin. Design and Implementation of Identity Authentication based on PAM[J]. Computer Science. 2005(02).

Google Scholar

[8] Yinfeng, Lin, Zhonghua, Feng. Design and Implementation of Campus Network Unified Identity Authentication based on LDAP[J]. China High Technology Enterprises. 2011(10).

Google Scholar

[9] Rongxin, Fu, Fanren, Kong. Research on Resource Sharing Platform Authentication Mechanism based on Shibboleth[J]. Journal of Hezhou University. 2011(02).

Google Scholar