期刊文献+

一种基于票据的单点登录协议设计与实现 被引量:7

Design and Implementation of a Ticket-Based Single Sign-On Protocol
在线阅读 下载PDF
导出
摘要 随着企业信息化建设的发展,企业信息应用系统的种类、数量越来越多,建立统一的身份认证管理机制,用户只需向身份认证中心提供一次身份信息,便可安全、平滑地访问不同应用系统,即实现单点登录,成为企业信息化建设的重要内容。根据当前企业信息应用系统已具有大量历史遗留帐号的实际情况,本文给出了一种基于票据的单点登录协议,对传统的基于票据的单点登录协议必须依赖全局统一用户身份标识的局限性进行改进,通过该协议能够简单、安全地实现对具有大量历史遗留帐号的应用系统的单点登录集成。 With the rapid development of the enterprise informatization construction,the enterprise information applications are built in increasing numbers.It is an inevitable trend to establish a unified identity management system to provide single sign-on among the enterprise applications.The user is able to access different enterprise applications securely and smoothly by providing his or her identity information only once in enterprise identity authentication center.In this paper,a ticket-based single sign-on protocol and the design of a protocol reference implementation are proposed.The new protocol improves the limitation of the classical ticket-based single sign-on protocol such as Kerberos.It is easier and safer to implement single sign-on for enterprise applications with a lot of legacy accounts.
作者 李凡 王流一
出处 《计算机工程与科学》 CSCD 北大核心 2012年第2期41-44,共4页 Computer Engineering & Science
关键词 单点登录 身份认证 访问管理单点登录 身份认证 访问管理 single sign-on identity authentication access management
  • 相关文献

参考文献6

  • 1Kreizman G. MarketScope for Enterprise Single Sign-On[R]. Gartner RAS Core Research Note G00170568, 2009.
  • 2Barish G, Obraczka K. World Wide Web Caching: Trends and Techniques[J]. IEEE Communications Magazine, 2000, 38(5) : 178-184.
  • 3Kohl J, Neuman C. The Kerberos Network Authentication Service (v5)[s]. RFC1510, 1993.
  • 4李继勇,陶然.一种单点登录协议的设计[J].计算机工程,2008,34(14):152-154. 被引量:10
  • 5Bellovin S M, Merritt M. Limitations of the Kerberos Authentication Systems[J]. ACM SIGCOMM Computer Corn munieation Review, 1990, 20 (5) :119-132.
  • 6杨智,陈性元,张斌.支持双认证方式的单点登录方案[J].计算机应用,2007,27(3):595-596. 被引量:10

二级参考文献10

  • 1文铁华,谷士文.增强Kerberos协议安全性的改进方案[J].通信学报,2004,25(6):76-79. 被引量:24
  • 2邓永江,程转流.一个改进的Kerberos认证协议设计与分析[J].福建电脑,2006,22(6):134-135. 被引量:4
  • 3SCHNEIERB.应用密码学:协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 4Microsoft..net passport review guide[EB/OL].http://www.Microsoft.com/net/services/passport/reviewguide.asp,2003 -03-13.
  • 5Libery Alliance Project.Liberty architecture overview[EB/OL].http://www.projectliberty.org/specs/liberty-architecture-overviewvl.1.pdf,2003 -01-15.
  • 6TUNG B.Public Key Cryptography for Initial Authentication in Kerberos[EB/OL].draft-ieff-cat-kerberos-pk-init-15.txt,2006.
  • 7SIRBU M,CHUANG J.Distributed Authentication in Kerberos Using Public Key Cryptography[A].Symposium on Network and Distributed System Security[C].1997.
  • 8Stallings W.密码编码学与网络安全:原理与实践[M].2版.杨明,译.北京:电子工业出版社,2001:256-270.
  • 9Bellovin S M, Merritt M. Limitations of the Kerberos Authentication Systems[J]. Computer Communication Review, 1990, 20(5): 119-132.
  • 10Sirbu M A. Chuang J C I. Distributed Authentication in Kerberos Using Public Key Cryptography[C]//Proceedings of the 1997 Symposium on Network and Distributed System Security. Washington, D. C., USA: IEEE Computer Society, 1997.

共引文献17

同被引文献44

引证文献7

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部