期刊文献+

家庭网络安全的研究 被引量:3

Research of Family Network's Security
在线阅读 下载PDF
导出
摘要 分析了数字媒体的内容管理和版权保护、家庭中网络设备和信息家电本身的安全机制、以及实现整个家庭网络的安全机制等家庭网络中安全涉及的主要方面。还考虑在实际的家庭网络环境中,根据用户的安全需求提供了不同层次和级别的安全策略:信息家电间无安全机制;信息家电间具有基本身份认证及消息认证机制;信息家电间具有完善的身份认证、消息传输加密及消息认证或消息签名机制。最后,分析了IPv6在家庭网络安全中的应用。 This article analyzes main aspects of safety in family network, including digital media content management and copyright protection, security mechanisms of family network devices and information appliances, and the realization of whole family network security mechanisms. And according to different security needs of users in reality, this article provides different levels of security strategy between Information Appliances : no security mechanism ; basic identity authentication and message authentication mechanism; identity authentication, encryption and message authentication or message signed mechanism. At last, the article analyzes the IPv6's applications in family network security.
作者 瞿绍军 刘宏
出处 《航空计算技术》 2007年第2期112-115,共4页 Aeronautical Computing Technique
基金 湖南省教育厅资助科研项目(04C393)
关键词 信息家电 KERBEROS IPV6 IPSEC 安全问题 家庭网络 information appliance kerberos IPv6 IPsec security problem family network
  • 相关文献

参考文献9

  • 1常晓波,杨剑峰译.安全体系结构的设计、部署与操作[M].北京:清华大学出版社,2003.
  • 2彭海清,冯涛,童登金.家庭网络的关键技术、业务及标准化[J].电信科学,2004,20(11):5-9. 被引量:8
  • 3梅苏文,高县明,刘文林,高兴锁.基于角色权限管理模型的设计与实现[J].现代计算机,2002,8(11):10-13. 被引量:22
  • 4S.Sakane,N.Okabe,K.Kamada,H.Esaki.Applying Kerberos to the Communication Environment for Information Appliances[J].SAINT 2003 Workshop,IEEE Computer Society Washington,DC,USA,2003:214-215.
  • 5RFC1510[EB].ftp://ftp.isi.edu/in -notes/rfc1510.txt,1993,9.
  • 6RFC4120[EB].http://www.ietf.org/rfc/rfc4120.txt,2005,7.
  • 7RFC1883[EB].http://www.ietf.org/rfc/rfc1883.txt,1995,12.
  • 8RFC2411[EB].http://www.ietf.org/rfc/rfc2411.txt,1998,11.
  • 9Merike Kaeo.IPv6 Security Technology Paper[EB].http://www.ipv6forum.org/dl/white/NAv6TF _ Security _ Report.pdf,2006,7,22.

二级参考文献6

  • 1[1]ITU-T J.190. Architecture of MediaHomeNet that supports cable-based services, 2002
  • 2[2]Digital Home-network Forum. Bridging to CE devices across IP domains,2004
  • 3[3]ITU-T Workshop on Home Network and Home Service. Home network architecture and logical entities, 2004
  • 4[4]ITU-T Workshop on Home Network and Home Service. Home gateway for managing home network QoS,2004
  • 5[5]ITU-T Workshop on Home Network and Home Service. Home network service aggregation platform and service collaborations, 2004
  • 6乔颖,须德,戴国忠.一种基于角色访问控制(RBAC)的新模型及其实现机制[J].计算机研究与发展,2000,37(1):37-44. 被引量:75

共引文献30

同被引文献26

  • 1彭海清,冯涛,童登金.家庭网络的关键技术、业务及标准化[J].电信科学,2004,20(11):5-9. 被引量:8
  • 2俞银燕,汤帜.数字版权保护技术研究综述[J].计算机学报,2005,28(12):1957-1968. 被引量:143
  • 3陈昭智,郑建德.一种基于身份分层结构加密算法的广播加密方案[J].厦门大学学报(自然科学版),2006,45(3):342-346. 被引量:8
  • 4田玉静.浅议数字家庭[J].电视技术,2007,31(8):54-55. 被引量:4
  • 5FiatA,NaorM. Broadcast encryption[A]. Proceedings of Crypto'93.- LNCS 773 [C]. Berlin:Springer-Verlag, 1993. 480-491.
  • 6Naor D, Naor M, Lotspiech J. Revocation and Tracing Schemes for Stateless Receivers [A]. Proceedings of Crypto'01: LNCS 2139[C]. Berlin:Springer-Verlag, 2001.41-62.
  • 7D Boneh, M Franklin. Identity Based Eneryption from the Well Pairing[Z]. Berlin: Springer-Verlag, 2001, 213-229.
  • 8Goodrich M, Sun J, Tamassia R. Efficient Tree-based Revocation in Groups of Low-state Devices[A]. Proceed- ings of Crypto'04: LNCS 3152[C]. Berlin: Springer-Verlag, 2004. 511-527.
  • 9Boneh D, Boyen X, Goh E. Hierarchical Identity Based Encryption with Constant Size Ciphertext [A]. Proceedings of Eurocrypt 2005:LNCS 3494[C]. Berlin: Springer Verlag, 2005. 440-456.
  • 10Boneh D, Boyen X. Efficient Selective-ID Identity Based Encryption Without Random Oracles[A]. Proceedings of Eurocrypt 2004: LNCS 3027[C]. Berlin: Springer-Verlag, 2004. 223-238.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部