期刊文献+

主动网络安全机制的分析与研究 被引量:2

Analysis and Research of Security Mechanism of Active Network
下载PDF
导出
摘要 分析了主动网络的安全机制,指出了存在的不足,提出了增强主动网络安全性的新思路———基于MPLS VPN技术的主动网络。由于引入了IPSec和MPLS VPN技术,使得基于MPLS VPN的主动网络既具有了一般主动网络的安全机制,同时也具有了MPLS VPN网络的抗攻击和抗标记欺骗的安全特性,有效提高了主动网络的安全性。 After analyzing the security mechanism about active network, point out the existing deficiency. A new way about how to enhance the active network security based on MPLS VPN is presented. As the IPSec and MPLS VPN technology introduced, the active network based on the MPLS VPN has not only the security mechanism of the active network, but the safety character against attacking and spoofing of the MPLS VPN active network. So the active network security can be improved.
作者 高发桂 高路
出处 《微机发展》 2005年第11期34-36,126,共4页 Microcomputer Development
关键词 主动网络 安全机制 多协议标签交换的虚拟专网 IPSEC active network security mechanism MPLS VPN IPSec
  • 相关文献

参考文献5

二级参考文献11

  • 1Liu Zhaoyu, Campbell R H, Mickunas M D. Securing the Node of an Active Network[ EB/OL]. http://www. cs. uiuc.edu/Dienst/UI/2.0/Describe/ncstrl. uiuc-cs,2000. 被引量:1
  • 2Sandhu R S, Coyne E J. Role - based access control models[J]. IEEE Computer, 1996,29(2) :38 -47. 被引量:1
  • 3Linn J. Ceneric Security Service Application Program Interface, Version 2. RFC 2078[S] .January 1997. 被引量:1
  • 4WetherallD,GuttagJ,TennenhouseDL.ANTS :Atoolkitforbuildinganddynamicallydeployingnetwork protocols. . 1 998 被引量:1
  • 5AlexanderDSetal.Activebridging. . 1 997 被引量:1
  • 6WetherallDJ,TennenhouseDL.TheactiveIPoption. . 1 996 被引量:1
  • 7YeminiY,deSilvaS.Towardsprogrammablenetworks. . 1 996 被引量:1
  • 8Tennenhouse D L,Wetherall D J.Towards an active network architecture[].ACM SIGCOMM Computer Communication Review.1996 被引量:1
  • 9Tennenhouse D L,et al.A survey of active network research[].IEEE Communications Magazine.1997 被引量:1
  • 10许强,温涛,赵宏.主动网络技术──新一代网络体系结构的发展趋势[J].计算机工程,2000,26(2):1-3. 被引量:3

共引文献14

同被引文献7

  • 1路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 2Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Advances in Cryptology-CRYPTO'84,LNCS 196.Berlin:Springer-Verlag,1984:47-53. 被引量:1
  • 3Martin L.Identity-Based Encryption:A Closer Look[J].The Global Voice of Information Security,2005,12:22-24. 被引量:1
  • 4Price G,Mitchell C J.Interoperation between a Conventional PKI and an ID-based Infrastructure[C]//Chadwick D W,Zhao G.Public Key Infrastructure,Second European PKI Workshop:Research and Applications,EuroPKI 2005.Canterbury,UK,2005.Revised Selected Papers,LNCS 3545,Berlin:Springer-Verlag,2005:73-85. 被引量:1
  • 5Boneh D.Franklin M.Identity-based Encryption from the Weil Pairing[C]//Advances in Cryptology-CRYPTO 2001,LNCS 2139.Berlin:Springer-Verlag,2001:213-229. 被引量:1
  • 6Chen L,Harrison K.Certification of Public Keys within an Identity-based System[C]//Information Security,5th International Conference,ISC,LNCS 2433.Berlin:Springer-Verlag,2002:322-333. 被引量:1
  • 7王建国,李增智,王宇,寇雅楠.通用的主动网络安全机制[J].西安交通大学学报,2002,36(8):818-821. 被引量:10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部