Proceedings of the 3rd International Conference on Big Data Economy and Digital Management, BDEDM 2024, January 12–14, 2024, Ningbo, China

Research Article

An Information Grading and Assessment Management System Based on a Dual Authentication Mechanism of Function and Management

Download46 downloads
  • @INPROCEEDINGS{10.4108/eai.12-1-2024.2347232,
        author={Siwei  Li and Chunzhi  Meng and Hushuang  Zeng and Xuexia  Quan and Songyao  Feng},
        title={An Information Grading and Assessment Management System Based on a Dual Authentication Mechanism of Function and Management},
        proceedings={Proceedings of the 3rd International Conference on Big Data Economy and Digital Management, BDEDM 2024, January 12--14, 2024, Ningbo, China},
        publisher={EAI},
        proceedings_a={BDEDM},
        year={2024},
        month={6},
        keywords={assessment management system authentication mechanism management system},
        doi={10.4108/eai.12-1-2024.2347232}
    }
    
  • Siwei Li
    Chunzhi Meng
    Hushuang Zeng
    Xuexia Quan
    Songyao Feng
    Year: 2024
    An Information Grading and Assessment Management System Based on a Dual Authentication Mechanism of Function and Management
    BDEDM
    EAI
    DOI: 10.4108/eai.12-1-2024.2347232
Siwei Li1, Chunzhi Meng1,*, Hushuang Zeng1, Xuexia Quan1, Songyao Feng1
  • 1: Information Communication Branch of Guangxi Grid Company
*Contact email: vipwymfya@126.com

Abstract

Starting from the perspective of cyberspace security management, this paper targets the organizational management needs in cyberspace security. In designing the hierarchical management architecture and authentication process for the public cyberspace infrastructure, the concept of partitioned system management is proposed. The overall architecture adopts a partitioned and layered design in which the core area, public area, and open area are divided. A dual authentication vulnerability management mechanism of both function and management is designed, providing security policies and implementation suggestions for user authentication and access control.