期刊文献+

基于PKI的Intranet安全模型的分析和设计 被引量:4

A Secure Model of Intranet Based on PKI:Analysis and Design
在线阅读 下载PDF
导出
摘要 Intranet的引入为企业内部实现资源共享、信息发布、通信联系、工作协同提供了一个快捷、高效、方便的网络环境,但是由于各种人为和非人为的原因,Intranet的安全性能也受到了巨大挑战。因此,如何采取有效措施,解决Intranet的安全问题,改善Intranet的运行环境,成为当前研究的热点。该文通过对当前Intranet存在的安全问题和安全需求进行充分分析,基于PKI技术来构建Intranet的安全体系:首先初步确定了在Intranet中PKI所采用的体系结构,然后作进一步的改进,最后设计出一种基于PKI的安全模型,按照该模型对Intranet安全体系进行构建,能够使企业内部安全地实现数据加密、身份认证、访问控制和数据完整性验证。 The Intranet emergence is to realize for the business enterprise inner part the resources shares, the information announces, correspondence contact, the work in conjunction provided a fast, efficiently, convenient network environment, but because of every kind of artificial with not artificial reason, the Intranet safe function also suffered big challenge. Therefore, how to adopt valid measure, solve safe problem of Intranet, improve the Intranet movement environment, become front investigative hot point. After discussing the security problem of an Intranet and its security need, this article comes to sets up the Intranet safe system according to the technique of PKI: the first step makes sure the PKI system construction, and combine to make the further improvement, finally designs the secure model of an Intranet according to PKI.Proceed to set up to the safe system in Intranet according to this model, which can safely performs data encryption, authentication, access control and data entirety validation in business enterprise.
出处 《微机发展》 2004年第5期83-86,共4页 Microcomputer Development
关键词 PKI INTRANET 数据加密 身份认证 访问控制 网络安全 Intranet public key infrastructure certificate authority secure model
  • 相关文献

同被引文献17

  • 1史伟奇,张波云,段丹青.PKI多级信任模型的分析研究[J].网络安全技术与应用,2004(12):24-26. 被引量:4
  • 2张妍,许云峰.Windows 2000下详细配置虚拟专用网络[J].河北工业科技,2005,22(6):377-379. 被引量:6
  • 3俞进福,李永忠.VPN技术的企业应用解决方案[J].武汉科技学院学报,2005,18(12):40-42. 被引量:6
  • 4Burr W E.Public Key Infrastructure(PKI)Technical Spe- cifications: Part A-Technical Concept of Operations[Z]. Work-ing Draft TWG-98-59.Federal PKI Technical Working Group, 1998.
  • 5RFC 2585,Intemet X.509 public key infrastructure operational protocols:FTP and HTTP[S].
  • 6Paxson V, Floyd S. Wide Area Traffic: The Failure of Poisson Modeling[J]. In IEEE/ACM Transaction on Networking,1995,3(3) :226-244.
  • 7Leland W E, Taqqu M S,Willinger W,et al. On the SelfSimilar Nature of Ethernet Traffic[J]. In IEEE/ACM Transaction on Networking, 1994,2 (1): 1 - 15.
  • 8Beran J. Statistics for Long - Memory Processes[M]. New York: Chapman & Hall, 1994.
  • 9Gilbert A C, Willinger W, Feldmann A. Scaling analysis of conservative cascades with applications to network traffic[J].IEEE Trans. on Info. Theory, 1999,45(3) :971 - 991.
  • 10Riedi R H, Crouse M S, Ribeiro V J, et al. A multifractal wavelet model with application to network traffic[J]. IEEE Trans. on Info. Theory, 1999,45(3):992 - 1018.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部