• Peer Review
  • Non-profit
  • Global Open Access
  • Green Channel for Rising Stars
Volume 2 Issue S1
Jul.  2020
Turn off MathJax
Article Contents

GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052
Citation: GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052

Design and Implementation of Authentication in Enterprise Information System

doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052
  • Received Date: 2015-12-15
  • This paper is aimed at the contradiction between the security and convenience of data access security and convenience in the enterprise information system. The 4A subsystem of the enhanced function with multiple authentication is designed and implemented in this paper for the role of user authority control. By the the construction of corporate identity, authority, certification, audit 4 system, the user in a log process only need one step and system automaticly carry on authentication operation. It uses smart strategy to autoconfigure the system, guarantee the authentication strengeh of resources, effectively ensure the data access security and simplify the loging procedure.
  • 通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

Article Metrics

Article views(103) PDF downloads(307) Cited by()

Related

Design and Implementation of Authentication in Enterprise Information System

doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052

Abstract: This paper is aimed at the contradiction between the security and convenience of data access security and convenience in the enterprise information system. The 4A subsystem of the enhanced function with multiple authentication is designed and implemented in this paper for the role of user authority control. By the the construction of corporate identity, authority, certification, audit 4 system, the user in a log process only need one step and system automaticly carry on authentication operation. It uses smart strategy to autoconfigure the system, guarantee the authentication strengeh of resources, effectively ensure the data access security and simplify the loging procedure.

GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052
Citation: GUO Wei. Design and Implementation of Authentication in Enterprise Information System[J]. SOUTHERN ENERGY CONSTRUCTION, 2015, 2(S1): 234-238. doi: 10.16516/j.gedi.issn2095-8676.2015.S1.052

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return