Proceedings of the 2018 Joint International Advanced Engineering and Technology Research Conference (JIAET 2018)

Research on Multiple Authentication Fuzzy Logic Relationship

Authors
Yuanyuan Wang, Guojian Cheng
Corresponding Author
Yuanyuan Wang
Available Online March 2018.
DOI
10.2991/jiaet-18.2018.80How to use a DOI?
Keywords
Multiple identity authentications; Fuzzy reasoning; Fuzzy logic relationship
Abstract

Users by different intensity authentication can gain different levels of access in secure operating system. Multiple authentication using Multiple Identity Authentications (MIA) mechanisms and MIA rules authenticate users, through the fuzzy inference, the different users are given different authentication strength, in order to lay the foundation for access control and authorization. In this paper, the implementation of MIA is briefly described, including Single-Mechanism (SM) and Multi-Rule (MR) authentication mode, Multi-Mechanism (MM) and Single-Rule (SR) authentication mode, MM and MR authentication mode. Subsequently, the Fuzzy Logic Relationship (FLR) between requisite authentication mechanism, sufficient authentication mechanism and restraint mechanism, and the FLR between MIA rules are described in detail. The different relations implementation methods and the main problems are analyzed. The methods of calculating under the different relations are given. This paper provides a theoretical foundation for further research on the secure operating system MA, with a theoretical and practical significance.

Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2018 Joint International Advanced Engineering and Technology Research Conference (JIAET 2018)
Series
Advances in Engineering Research
Publication Date
March 2018
ISBN
978-94-6252-507-8
ISSN
2352-5401
DOI
10.2991/jiaet-18.2018.80How to use a DOI?
Copyright
© 2018, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Yuanyuan Wang
AU  - Guojian Cheng
PY  - 2018/03
DA  - 2018/03
TI  - Research on Multiple Authentication Fuzzy Logic Relationship
BT  - Proceedings of the 2018 Joint International Advanced Engineering and Technology Research Conference (JIAET 2018)
PB  - Atlantis Press
SP  - 452
EP  - 456
SN  - 2352-5401
UR  - https://doi.org/10.2991/jiaet-18.2018.80
DO  - 10.2991/jiaet-18.2018.80
ID  - Wang2018/03
ER  -