期刊文献+

IBC模型在Web安全体系中的应用研究 被引量:3

Research of IBC Model and Application in Web-Security System
在线阅读 下载PDF
导出
摘要 针对目前基于公钥证书的PKI体系所固有的网络开销大,证书往来过于频繁等缺点,提出并分析了基于身份加密体系(IBC体系)的认证架构和互动模型,说明了IBC模型相对于PKI体系结构的优缺点。针对XML签名和XML加密这两个Web-Security核心协议,比较了使用X.509公钥证书体系和IBC无证书方式在SOAP协议中的实现方式。证明了在保证信息安全的同时,使用IBC模型可以大幅降低网络传输内容,提高了SOA体系的效率和可扩展性。 To overcome the shortcomings,such as high-load network communication,and too many credential exchanges caused by conventional certificate-based PKI infrastructure,the identity-based cryptography model and its interaction model were presented in this paper,and its pros and cons to conventional certificate-based PKI system were also discussed. In this paper,we take XML Signatures and XML Encryption as example to show how IBC technology replaces the X.509 certificate public key infrastructure in SOAP protocol. After the evaluation,it is proven that while protected the safety of message,making use of IBC model can greatly reduce network communication cost and increase the efficiency and extensibility in SOA system.
出处 《计算机仿真》 CSCD 北大核心 2010年第9期120-124,共5页 Computer Simulation
关键词 基于身份加密模型 网络安全 标记语言签名 标记语言加密 IBC model Web-security XML signatures XML encryption
  • 相关文献

参考文献22

  • 1Jothy Rosenberg,David L.Remy.Securing Web Services with WS-Security[M].Sams Publish May 12 2004.408.
  • 2Dirk Krafzig,Karl Banke,Dirk Slama.Enterprise SOA.Service-Oriented Architecture Best Practice[M].Prentice Hall,Nov.9 2004.408.
  • 3Mark O'Neill et al.Web Services Security[M].McGraw-Hill/Osborne 2003.312.
  • 4Bret Hartman,Donald J Flinn,Konstantin Beznosov,Shirley Kawamoto.Master Web Services[M].Security Wiley Publishing,Inc.,2003.
  • 5Adi Shamlr.Identity based cryptosystems and signature schemes[C].In G.BIakley and David Chaum,editors,Proceedings of Crypto 1984,volume 196 of LNCS.Springer-Verlag,1984.47-53.
  • 6Dan Boneh,Matt Franklin.Identity-based encryption from the Well pairing[C].Joe Kilian,editor,Proceedings of Crypto 2001,LNCS Springer-Verlag,2001,2139:213-229.
  • 7Dan Boneh,Xavier Boyen,Eu-Jin Goh.Hierarchical identity based encryption with constant size ciphertext[C].Advances in Cryptology Eurocrypt 2005 Springer-Verlag,2005,LNCS,2005,3494:440-456.
  • 8Sherman S M Chow,et a1.Secure hierarchical identity based signature and its application[J].ICICS 2004,Springer-Verlag,LNCS,2004,3269:480-494.
  • 9S S Al-Riyami and K G Paterson.Certificateless public key cryptography[C].In C S Laih,editor,Advances in Cryptology-Proceedings of Asiacrypt 2003.Springer-Verlag LNCS 2894,November 2003.452-473.
  • 10Markus Lorch,Seth Proctor,Rebekah Lepro.First Experiences Using XACML for Access Control in Distributed Systems[M].ACM Workshop on XML Security,October 31,2003.25-37.

二级参考文献64

  • 1王荣斌,陈蜀宇,姬晓波,喻林.一种基于身份网格认证框架的零知识改进方案[J].华中科技大学学报(自然科学版),2006,34(Z1):167-170.
  • 2彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:6
  • 3古鹏,徐开勇,李立新.基于XKMS的安全Web服务组件的研究与设计[J].微计算机信息,2006,22(02X):22-24. 被引量:3
  • 4Web Services Security (WS-Security) version1. 005,April 2002.http://www-106. ibm. com/developerworks/webservices/library/ws-secure/.?A
  • 5W3C Working Draft. XML Encryption Syntax and Processing,March 2002. http://www. w3. org/TR/xmldsig-core/.
  • 6W3C Recommendation. XML-Signature Syntax and Processing.2002. http://www. w3. org/TR/xmldsig-core/.
  • 7OASIS Standard. Security Assertion Markup Language,SAML1.1, Oct. 2003. http ://www. oasis-open. org/committees/security/docs/cs-sstc-core-01. pdf.
  • 8OASIS Standard. XACML 1. 0 Specification Set. Feb. 2003.http://www. oasis-open. org/committees/xacml/.
  • 9ContentGuard,Inc. eXtensible Rights Markup Language, XrML 2.0. (2001) http://www. xrml. org.
  • 10W3C Working Note. XML Key Management (XKMS 2. 0).http://www. w3. org/2001/XKMS/.

共引文献170

同被引文献19

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部