期刊文献+

安全域间信息资源访问的协议和方法 被引量:7

Security Protocol and Scheme for Inter-Realm Information Accessing
在线阅读 下载PDF
导出
摘要 为了保护内部网络的安全,必须设置应用边界安全设备.Internet上不同的应用安全域间要实现信息资源的安全访问,首先需要认证.Kerberos是目前比较常用的认证协议,一般的应用边界安全设备(如Socks5)中就应用了该认证协议,但应用该协议存在一定的缺陷:在应用边界安全设备链的认证过程中,资源域中的应用边界安全设备认证对象是主体域中的应用边界安全设备,而不是真正发起资源请求的客户端,因此资源域中的应用边界安全设备审计的对象是主体域中的应用边界安全设备,而不是真正的客户端.在Kerberos域间认证的基础上,给出了新的域间认证协议以及身份传递协议,使用新的协议不仅能够提供应用边界安全设备对用户访问请求的安全审计而且只需要两次域间的网络连接,这两次域间网络连接不需要主体和客体直接进行,而是通过应用边界安全设备完成的,提高了系统的通信效率,扩大了该系统的应用范围,适合于现有的企业网环境,能有效地解决企业网与企业网之间的信息安全传输. In order to improve the security of Intranet, application boundary security devices must be set. In order to access resources in different application areas on Internet in a security way,authentication is the first key step. Kerberos is an authentication protocol that is widely used. It is applied in application boundary security devices such as socks5. But there exists some limitation. In the processing of authentication between application boundary security devices, the object authenticated by application boundary security device at resource realm is not client which requests the resource, but application boundary security device at principal realm. So the object audited by application boundary security device at resource realm isn't the really one. A new inter-realm authentication protocol and a new identity-passing protocol based on Kerberos v5 inter-realm authentication protocol are presented in this paper. The proposed protocols can not only supply the security audit for user's access requests at application boundary security devices but also improve the efficiency of communication system because it needs only two connections between realms and the connection is setup not by subjects and objects but by application boundary security device. The proposed scheme can solve the problem of security information transferring between enterprise networks which will expand its application boundary including current enterprise network.
出处 《计算机研究与发展》 EI CSCD 北大核心 2005年第9期1587-1593,共7页 Journal of Computer Research and Development
基金 国家"八六三"高技术研究发展计划基金项目(2002AA144020 2002AA1Z2101) 国家"九七三"重点基础研究发展规划基金项目(TG1999035801)~~
关键词 KERBEROS认证 应用边界 域间身份认证 身份传递 Kerberos authentication application boundary inter-realm authentication identity passing
  • 相关文献

参考文献5

  • 1John T. Kohl, B. Clifford Neuman, et al. The evolution of the Kerberos authentication system. In: Distributed Open Systems.Los Alamitos, CA: IEEE Computer Society Press, 1994. 78~94.
  • 2B. Clifford Neuman, Theodore Y. Ts' o. Kerberos: An authentication service for computer networks. IEEE Communications, 1994, 32(9): 33~38.
  • 3Ian Downard. Public-key cryptography extensions into Kerberos.IEEE Potentials, 2002, 21(5): 30~34.
  • 4M. Steven. Bellovin, Michael Merritt. Limitations of the Kerberos authentication system. Computer Communication Review, 1990, 20(5): 119~132.
  • 5M. Leech, M. Ganis, Y. Lee, et al. SOCKS Protocol Version 5. RFC1928. http : ∥archive. socks. permeo. corr/rfc/rfc1928.txt, 1996.

同被引文献96

引证文献7

二级引证文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部