期刊文献+

基于代理属性证书的分布式RBAC系统

Distributed RBAC system based on proxy attribute certificates
下载PDF
导出
摘要 采用属性证书的方式可对分布式RBAC系统中的用户进行有效的管理,并通过证书中的签名确保证书的有效性。但全部工作都由系统管理员完成,因此管理员的负担较重,在大型分布式的应用中存在瓶颈。设计基于可跟踪代理签名的证书及其代理发布,不仅有效地分散了管理员的任务,而且管理员和代理者不能滥用权力,攻击者也不能伪造证书和冒充用户,解决了管理员签发证书的效率问题,提高了RBAC系统的效率和安全性。 Using attribute certificates can manage users of RBAC models in distributed system efficiently;the signature in certificate guarantees the validity of the certificate.While the entire work of validating and publishing certificates done by system manager,the task is heavy,so bring out bottleneck in large distributed application.Designing a certificate structure and its proxy publishing based on traceable proxy signature,not merely scattered the task of manager,publisher and proxy signatures can't abuse their power,attackers can not forge certificate and imitate user.In this way ,solve the problem of manager's efficiency ,and improve the efficiency and security of RBAC system as well.
作者 胡坤华 粟栗
出处 《计算机工程与应用》 CSCD 北大核心 2007年第5期146-149,共4页 Computer Engineering and Applications
关键词 分布式系统 RBAC 代理签名 证书 distributed system RBAC proxy signature certificate
  • 相关文献

参考文献9

二级参考文献61

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2.授权管理基础设施PMI技术与应用[EB/ON].http://www. cert. org. cn/articles/tabloid/common/2003112021306. shtml.,. 被引量:1
  • 3CHAUM D, EVERTSE J H, GRAFF J V. An improved protocol for demonstrating possession of discrete logarithms and some generalizations[A]. Proceedings of Eurocrypt'87 [C]. 1988. 127-141. 被引量:1
  • 4CHAUM D, EVERTSE J H, GRAFF J V, et al. Domonstrating possession of a discrete logarithm without levealing it[A]. Proceedings of Crypt'86 [C]. 1987. 200-212. 被引量:1
  • 5LANDFORD S. Weakness in some threshold cryptosystems [A]. Proc of Crypto'96 [C]. 1996. 74-82. 被引量:1
  • 6MAMBO M, USUDA If., OKAMOTO E. Proxy signatures for delegating signing operation[A]. Proc 3rd ACM Conference on Computer and Communications Security[C]. ACM Press, 1996. 48-57. 被引量:1
  • 7MAMBO M, USUDA K, OKAMOTO E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Trans Fundam, 1996,E79-A (9): 1338-1354. 被引量:1
  • 8ZHANG IC Threshold proxy signature schemes[A]. 1997 Information Security Workshop[C]. Japan, 1997. 191-197. 被引量:1
  • 9SUN H M. LEE N Y. HWANG T. Threshold proxy signatures[J], IEE Proc Computers & Digital Techniques, 1999, 146(5): 259-263. 被引量:1
  • 10KIM S, PARK S, WON D. Proxy signatures, revisited [A]. Proc ICICS'97[C]. Int Conf on Information and Communications Seurity,LNCS, Springer-Verlag, 1997. 1334: 223-232. 被引量:1

共引文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部