期刊文献+

主动网基于交叉证书的多信任域认证模型

Cross-Certificate Based Authentication Model for Multi-Domain on Active Network
下载PDF
导出
摘要 认证是保证主动网安全性的前提和基础,传统的主动网认证采用基于证书的认证方法,由于基于身份的PKI(ID-PKI)可以避免传统公钥密码体制中使用证书带来的种种弊端,因此越来越倍受关注。多种认证技术的并存是不可避免的事实,如何在不同类型的信任域间实现跨域认证是主动网安全研究的重要问题之一。在探讨ID-PKI在主动网上实施问题的基础上,提出了一种基于交叉证书的多信任域认证模型,在不同类型的信任域间提供双向实体认证,能较好地符合主动网认证的实际需要。 Authentication is the premise and foundation of safety on active network. Active networks traditionally carry out authentication with Certificate- PKI; however, it is less efficient than ID- PKI which has been increasingly researched recently. Because of the coexistence of multi - PKI, how to implement authentication for multi - domain would become one of the most important problems on active network security. Analyzes the applications of ID- PKI on active network,and proposes a certificate- based authentication model for multi-domain,which supports cross- domain mutual entity authentication and is very suitable for practice of authentication on active network.
出处 《计算机技术与发展》 2007年第11期145-148,152,共5页 Computer Technology and Development
基金 福建省2004年自然科学基金资助项目(A0410004) 厦门大学院士基金资助项目(0630-E23011) 厦门大学新世纪优秀人才支持基金资助项目(0000-X07116) 广东省自然科学基金资助项目(06029667) 广东中山市2006年科技计划项目
关键词 主动网 认证 交叉证书 ID-PKI active network authentication cross - certificate ID- PKI
  • 相关文献

参考文献9

  • 1高发桂,高路.主动网络安全机制的分析与研究[J].微机发展,2005,15(11):34-36. 被引量:2
  • 2唐寅..基于授权的主动网络安全防护技术研究[D].电子科技大学,2003:
  • 3Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Advances in Cryptology-CRYPTO'84,LNCS 196.Berlin:Springer-Verlag,1984:47-53. 被引量:1
  • 4Martin L.Identity-Based Encryption:A Closer Look[J].The Global Voice of Information Security,2005,12:22-24. 被引量:1
  • 5Price G,Mitchell C J.Interoperation between a Conventional PKI and an ID-based Infrastructure[C]//Chadwick D W,Zhao G.Public Key Infrastructure,Second European PKI Workshop:Research and Applications,EuroPKI 2005.Canterbury,UK,2005.Revised Selected Papers,LNCS 3545,Berlin:Springer-Verlag,2005:73-85. 被引量:1
  • 6路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 7Boneh D.Franklin M.Identity-based Encryption from the Weil Pairing[C]//Advances in Cryptology-CRYPTO 2001,LNCS 2139.Berlin:Springer-Verlag,2001:213-229. 被引量:1
  • 8Chen L,Harrison K.Certification of Public Keys within an Identity-based System[C]//Information Security,5th International Conference,ISC,LNCS 2433.Berlin:Springer-Verlag,2002:322-333. 被引量:1
  • 9王建国,李增智,王宇,寇雅楠.通用的主动网络安全机制[J].西安交通大学学报,2002,36(8):818-821. 被引量:10

二级参考文献31

  • 1[1]Tennenhouse D L,Smith J M,Sincokie W D,et al.A survey of active network research [J].IEEE Comm Mag, 1997,35(1):80~85. 被引量:1
  • 2[2]Active Networks Working Group. Architectural fram-ework for active networks (Version 1.0)[EB/OL].http://www.cc.gatech.edu/projects/canes/arch/arch-1-0.ps,1999-07-27/2000-02-15. 被引量:1
  • 3[3]Fry M,Ghosh A.Application level active networking[J].Computer Network,1999,31(7):655~667. 被引量:1
  • 4[4]Konstantions P.Active network:application,security,safety and architecture [EB/OL].http://www.comsoc.org/pubs/surveys,1998-04-16/2001-10-12. 被引量:1
  • 5[5]Ken C,Roy C,Carl G,et al.Security architecture for active networks [EB/OL].http://www.ittc.ukans.edu/~ansecure/0079.html,2000-05-19/2000-12-10. 被引量:1
  • 6[6]Schwartz B,Jackson A W,Strayer W T,et al.Smart Packets:applying active networks to network management [J].ACM Transactions on Computer Systems,2000,18(1):67~88. 被引量:1
  • 7[7]Scott D A,William A A,Angelos d K,et al.A secure active network environment architecture:realization in switchware [J].IEEE Network,1998,12(3):37~45. 被引量:1
  • 8[8]Scott D A,Bob B,Carl A G,et al.ANEP:active network encapsulation protocol [EB/OL].http://www.cis.upenn.edu/SwitchWare/ANEP/docs/ANEP.txt,1997-07-01/2000-03-09. 被引量:1
  • 9[9]Li G.Inside Java2 platform security,architecture,API design and implemmentation [M].Beijing:China Machine Press,2000. 被引量:1
  • 10[10]Dang L.Certificate active network security architecture [D].Sydney,Australia:Basser Department of Computer Science,1998. 被引量:1

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部