期刊文献+

Security Considerations Based on PKI/CA in Manufacturing Grid 被引量:1

Security Considerations Based on PKI/CA in Manufacturing Grid
下载PDF
导出
摘要 In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid; then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment. In the manufacturing grid environment, the span of the consideration of security issues is more extensive, and the solutions for them are more complex, therefore these problems in manufacturing grid can't longer be addressed by existing security technologies. In order to solve this problem, the paper first puts forward the security architecture of manufacturing grid on the basis of the proposal of the security strategies for manufacturing grid; then the paper introduces key technologies based on public key infrastructure-certificate authority (PKI/CA) to ensure the security of manufacturing grid, such as single sign-on, security proxy, independent authentication and so on. Schemes discussed in the paper have some values to settle security problems in the manufacturing grid environment.
作者 YIN Yong LI Yu
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1414-1418,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foun-dation of China (50335020)
关键词 manufacturing grid public key infrastructure-certificate authority (PKI/CA) single sign-on security authentication manufacturing grid public key infrastructure-certificate authority (PKI/CA) single sign-on security authentication
  • 相关文献

参考文献17

二级参考文献26

  • 1邓静,王帮海,徐建哲,李振坤.网格实例——Globus的研究与探讨[J].计算机应用,2003,23(z1):222-224. 被引量:2
  • 2妻晓铭 刘晨.Java编程语言[M].北京:冶金工业出版社,2000.232-239. 被引量:1
  • 3徐志伟.互联网涅正在浮现的网格技术[J].互联网世界,2001,(11):22-27. 被引量:1
  • 4Foster I, Kesselman C. Globus project [ EB/OL]. http ://www. globus. org. 2001. 被引量:1
  • 5Tuecke S. Grid security infrastructure(GSI) roadmap[EB/OL], http://www. gridforum, org/security/ggfl-2001-03/drafts/ draft-gridforum-gsi-roadmap-02, txt. 2001. 被引量:1
  • 6Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[A]. In: Reiter M, ed. Proceedings of the 5^th ACM conference on computer and communications security[J]. New York: ACM Press, 1998.83 ~ 91. 被引量:1
  • 7Jackson K, Tuecke S, Engert D. TLS delegation protocol [ EB/OL].http: //www. gridforum, org/security/ggf1-2001-03/drafts/draft- ggf-tlsdelegation-09, txt, 2001. 被引量:1
  • 8Tuecke S, Engert D, Foster I. Internet X .509 public key infrastructure proxy certificate profile [ EB/OL]. http://caops. es. net/documents/certprofile, doc, 200.1. 被引量:1
  • 9Wong C, Gouda M, Lain S. Secure group communications using key graphs[ EB/OL]. hup://www.acm. org/sigcomm/sigcomm98/ rp/paper06, pdf, 1998. 被引量:1
  • 10姜晓铭,Java编程语言,2000年,232页 被引量:1

共引文献44

同被引文献9

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部