期刊文献+

数字化图书馆中基于PKI/PMI的安全认证设计 被引量:1

Design of Security Authenticate Based on PKI/PMI Architecture in Digital Library
在线阅读 下载PDF
导出
摘要 首先介绍目前数字化图书馆安全认证所面临的问题,然后在分析PKI、PMI的基础上提出了一个基于公开密钥证书和属性证书的双证书联合认证方案。其中使用公开密钥证书实现对用户的身份认证,属性证书实现用户的授权访问,能够保证不同用户具有不同的访问权限。该方案一定程度上满足了数字图书馆安全认证的要求,从而方便灵活地实现对数字资源的安全访问控制。 First, this paper briefly introduces problems in security certification of digiital library currently, and then proposes a dual certificate joint certification mechanism on the base of both public-key certificates and attribute certificates based on analyzing the PKI and PMI. The mechanism uses public key certificates to achieve user authentication, attribute certificate achieve the user's authodzed access, to ensure that different users have different access rights. A certain extent ,this mechanism meet with the requirements of Security Authenticate in Digital Library. Thereby, expediently and neatly realize security access control for digital resource.
作者 翟剑锋
出处 《信息安全与技术》 2013年第9期23-25,30,共4页
关键词 公开密钥基础设施 授权管理基础设施 安全认证 PKI PMI secudty authenticate
  • 相关文献

参考文献10

二级参考文献27

  • 1冯登国,李丹.积极推进PKI/PMI标准的制订与应用[J].计算机安全,2005(9):14-15. 被引量:2
  • 2[1]ITU-T Recommendation X.509.Information Technology-Open System Interconnection- The Directory:Public Key and Attribute Certificate Framework.2000
  • 3[2]Oppliger R,Permul G,Strauss C.Using Attribute Certificates to Imple-ment Role-based Authorization and Access Controls.http:∥www.entrust, com
  • 4[3]Entrust XML Strategy for Authorization. http:∥www.entrust.com
  • 5[4]ISO 1018 1-3.1nformation Technology - Open Systems Interconnection Security frameworks for Open System:Access Control Framework.
  • 6[5]Boeyen S.X.509 (2000):4th Edition:Overview of PKI & PMI Frame-works.http:∥www.entrust.com
  • 7霍尔泽.Eclipse集成开发工具[M].南京:东南大学出版社,2005.
  • 8Chadwick D W.An X.509 Role-based Privilege Management Infrastructure[R].U.K.:University of Salford,2002.
  • 9Wohlmacher P.Application in Health Care Using Public Key Certifications and Attribute Certificates[C]//Proc.of ACSAC'00.Austria:[s.n.],2000.
  • 10Johnston W,Mudumbai S,Thompson M.Authorization and Attribute Certificates for Widely Distributed Access Control[C]//Proc.of ICE'98.Washington,D.C.,USA:IEEE Computer Society,1998.

共引文献88

同被引文献5

  • 1美国国家标准与技术研究院(National Institute of Standards and Technology, NIST).The NIST Definition of Cloud Computing[R/OL]. [2015-4-13]. http://csrc.nist.gov/publications/ nistpubs/800-145/SP800-145.pdf.
  • 2欧洲网络和信息安全局(European Networkand Information Security Agency, ENISA) Cloud Computing Security Rdsk Assessment [R/OL]. [2015-4-28].http://www.enisa. europa eu/activities/risk -management/files/deliver- ables/cloud -computing -risk -assessment/ at download/fullReport.
  • 3云计算安全联盟(Cloud Security Alliance,CSA).The Notorious Nine: Cloud Computing Top Threats in 2013 [R/OL].[2015-4-30]. https:// downloads.cloudsecurityalliance.org/initiatives/ top threats/The_Notorious_Nine Cloud_Com- puting_Top_Threats in 2013.pdf.
  • 4张叶红.数字图书馆云计算安全架构及其管理策略[J].图书馆学研究,2010(11):30-34. 被引量:24
  • 5秦珂.云计算环境下图书馆的著作权法律风险规避[J].图书馆工作与研究,2013(12):10-13. 被引量:5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部