期刊文献+

基于多媒体应用的安全研究

The Research of Security Based on Multimedia Applications
在线阅读 下载PDF
导出
摘要 网络的迅猛发展,让多媒体的应用更加广泛,多媒体的安全问题受到了越来越多的关注。本文首先对安全的相关技术进行了详细分析,描述了PKI/PMI技术及XML安全技术;其次对多媒体应用的安全框架进行了详细的分析和论述,将其分为三个层次模块,对每个模块进行初步的介绍;最后对部分模块的实现进行了分析。本文对于研究IT安全和多媒体工作人员有着积极的作用。 With the rapid development of network, multimedia applications becomes more widely, the multimedia security has received more and more attention. Firstly, technologies related to security are analyzed in detail, the PKI/PMI technology and XML security technology description; secondly, the multimedia application security framework are analyzed and discussed in detail, which is divided into three layers, the initial presentation of each module; the implementation of some modules are analyzed. This paper has the positive effect on the research of IT security and multimedia staff.
出处 《信息安全与技术》 2013年第6期83-85,94,共4页
关键词 多媒体 应用 安全 multimedia application security
  • 相关文献

参考文献4

二级参考文献9

  • 1吴立军,苏开乐.基于角色PMI的电子政务安全模型[J].计算机工程与应用,2004,40(31):117-119. 被引量:6
  • 2[1]Hwang Jingjang, Wu Kouchen, Liu Duenren. Access Control with Role Attribute Certificates[J]. Computer Standards & Interfaces,2000, 22: 43-53
  • 3[2]Johnston W, Mudumbai S, Thompson M. Authorization and Attribute Certificates for Widely Distributed Access Control[J]. Information and Computing Sciences Division, Lawrence Berkeley National Laboratory Berkeley, CA, 94720, 1998
  • 4[3]Wohlmacher P, Pharow P. Application in Health Care Using Public Key Certifications and Attribute Certificates[J]. IEEE Journal,2000: 1063-9527
  • 5[4]Lin A, Brown R. The Application of Security Policy to Role-based Access Control and the Common Data Security Architecture[J]. Computer Communications,2000,23: 1584-1593
  • 6[5]Doshi V, Fayad A, Jajodia S, et al. Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications[J].IEEE Journal, 2000:1063-9527
  • 7Boeyen S.X.509(2000):Overview of PKI & PMI Frameworks (4……th Edition)[Z].http://www.entrust.com/resourcecenter/pdf/509-overview.pdf,2003.
  • 8Ferrall S.An Internet Attribute Certificate Profile for Authorization[Z].http://www.ietf.org/rfc/rfc3281.txt,2003.
  • 9谭强,黄蕾.PMI原理及实现初探[J].计算机工程,2002,28(8):187-189. 被引量:24

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部