期刊文献+

主动网跨类型信任域的认证模型 被引量:1

Authentication Model for Multi-domain Using Different Authentication Technologies on Active Network
在线阅读 下载PDF
导出
摘要 多种认证技术的并存是不可避免的事实,如何在不同类型的信任域间实现跨域认证是主动网安全研究的重要问题之一。该文分析了主动网认证的特点和研究现状,提出了一种跨类型多信任域的认证模型,并设计了一套协议以保证认证过程的安全实施。在不同类型的信任域间提供双向实体认证,能较好地符合主动网认证的实际需要。 Because of the coexistence of multi-PKI, how to implement authentication for multi-domain would become one of the most important problems on active network security. This paper proposes an authentication model and designs a suit of protocols to satisfy these actualities. The model which Supports cross-domain mutual entity authentication is very suitable for the practice of authentication on active network.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第11期138-140,共3页 Computer Engineering
基金 福建省自然科学基金资助项目(A0410004) 厦门大学院士基金资助项目(0630-E23011) 厦门大学新世纪优秀人才支持基金资助项目(0000-X07116) 广东省自然科学基金资助项目(06029667) 广东省中山市科技计划基金资助项目
关键词 主动网 认证 多信任域 Active network Authentication Multi-domain
  • 相关文献

参考文献4

  • 1王晓宁,顾国飞,朱斌,张世永.主动网络授权和认证研究[J].计算机工程与应用,2003,39(36):166-169. 被引量:4
  • 2Foster I,Kesselman C,Tsudik G.A Security Architecture for Computational Grid[C]//Proceedings of the 5^th ACM Conference on Computer and Communications Security.New York:ACM Press,1998:83-92.
  • 3Price G,Mitchell C J.Interoperation Between a Conventional PKI and an ID-based Infrastructure[C]//Proceedings of the 2^nd European PKI Workshop:Research and Applications.Berlin:Springer-Verlag,2005:73-85.
  • 4路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32

二级参考文献24

  • 1[1]David L Tennenhouse,Jonathan M.Smith,W.David Sincoskie et al.A survey of active network research[J].IEEE Communications Magazine,January, 1997; 35 (1): 80~86
  • 2[2]D Scott Alexander,William A Arbaugh,Angelos D Keromytis et al.Security in active net orks[C].In :Secure Intemet Programming:Issues in Distribute and Mobile,Object Systems,Lecture Notes in Computer Science State-of- the-Art,Springer-Verlag Inc.,New York,NY,USA,1999
  • 3[3]D Scott Alexander,William A Arbaugh,Angelos D Keromytisand et al.Safety and security of programmable,network infrastructures[J].IEEE Communications Magazine,issue on Programmable Networks, 1998 ;36(10):84~92
  • 4[4]Zhaoyu Liu,Roy H Campbell,M Dennis Mickunas. Se curing the node of an active net ork[C].In:Active Middleware Ser vices,Salim Hariri,Craig Lee Eds. Klu er Academic Publishers,Boston,MA,2000
  • 5[5]K L Calvert. Architectural framework for active networks,version 1.0.University of Kentucky, 1999-07
  • 6[6]AN Node OS Working Group. NodeOS interface specification,2000-01
  • 7[7]S Murphy,E Lewis,R Puga et al. Strong Security for Active Network [C].In:IEEE OPENARCH 2001,2001
  • 8[8]D Eastlake. Domain name system security extensions[S].RFC2535,IBM. 1999-03
  • 9ANSI X. 962. Public key cryptography for the financial services industry:the elliptic curve digital signature algorithm (ECDSA) [ S ]. 1999.
  • 10Shamus software ltd, multiprecision integer and rational arithmetic C/C ++ library [OL]. http ://indigo. ie/-mscott/.

共引文献33

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部