期刊文献+

基于分层身份的电子政务网格认证模型研究 被引量:2

Research on Hierarchical ID-based E-government Grid Authentication Model
下载PDF
导出
摘要 在网格环境中,PKI公钥管理方式对GSI认证效率产生一定的制约,而基于IBC的认证机制轻量、高效,密钥管理较为简便,改进了TLS握手协议,在此基础上提出一种适用于电子政务网格的基于HIBC的认证模型HIAM(Hierarchical ID-based Authentication Model),该模型克服了基于PKI的证书认证机制效率方面的缺点,通过与GSI的结合,重用GSI提供的安全服务,同时便于部署。 In grid environment, the authentication efficiency of GSI is restricted by the key management methods of PKI. IBC-based authentication mechanism is lightweight, efficient and of more convenient key management. Therefore, this paper improved TLS handshake protocol and proposed a model named HIAM (Hierarchical ID-based Authentica- tion Model) based on HIBC. HIAM overcame the efficiency drawback of PKI-based authentication mechanism, com- bined with security service of GSI, and was feasible to deploy.
出处 《计算机科学》 CSCD 北大核心 2008年第12期55-57,61,共4页 Computer Science
基金 国家自然科学基金重大研究计划重点项目(No.90412012) 国家自然科学基金面上项目(No.60673160) 济南大学博士科研启动基金(No.B0626)
关键词 GSI(Grid SECURITY Infrastructure) HIBC(Hierarchical ID-basedcryptography) IBC(ID-basedcryptography) 认证模型 电子政务网格 GSI (Grid Security Infrastructure), HIBC (Hierarchical ID-based cryptography),IBC (ID-based cryptography), Authentication model, e-government gird
  • 相关文献

参考文献7

  • 1Foster I,Kesselman C,Tuecke S. The anatomy of the grid: enabling scalable virtual organizations[J]. International Journal on Supercomputer Applications, 2001,15 (3) : 200-222 被引量:1
  • 2Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids[C]//Proceedings of the 5th ACM Conference on Computer and Communications Security. 1998:83-92 被引量:1
  • 3沈昌祥.网络信任与公钥认证[J].电子商务,2006,7(3):58-64. 被引量:4
  • 4Shamir A. Identity-based cryptosystems and signature schemes [C]//Proceedings of the Cryptology-Crypto' 84. 1984:47-53 被引量:1
  • 5Boneh D, Franklin M. Identity-based encryption from the well pairing[C]//Proceedings of the Cryptology-Crypto 2001. 2001: 213-229 被引量:1
  • 6Gentry C,Silverberg A. Hierarchical ID-based cryptography[C] //Proceedings of Asiacrypt 2002. LNCS 2501. Berlin: Springer-Verlag, 2002 : 548-566 被引量:1
  • 7Dierks T, Allen C. The TLS Protocol Version 1.0 [S]. RFC 2246 ,January 1999 被引量:1

共引文献3

同被引文献36

  • 1彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 2路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 3Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure[M]. New York, USA: Morgan Kaufmann, 1999. 被引量:1
  • 4Welch V, Foster I, Kesselman C. X.509 Proxy Certificates for Dynamic Delegation[C]//Proceedings of the 3rd Annual PKI R&D Workshop. [S. l.]: IEEE Press, 2004. 被引量:1
  • 5Boneh D, Franklin M. Identity Based Encryption from the Weil Pairing[J]. SIAM Journal on Computing, 2003, 32(3): 586-615. 被引量:1
  • 6Gentry C, Silverberg A. Hierarchical ID-based Cryptography[C]//Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security. Queenstown, New Zealand: [s. n.], 2002. 被引量:1
  • 7Venus.云计算及主要存在的安全问题[EB/OL].比特网.(2013-06-02) [ 2014-03-26 ]. http://cloud, chinabyte, com/ tech/36/12645536, shtml). 被引量:1
  • 8TechTarget中国.云单点登录,成熟的服务机遇[EB/OL].[2013-04-20].http://labs.chinamobile.oom/news/77205-p2. 被引量:1
  • 9Zhu L, Jaganathan K, Hartman S. The Kerberos Version 5 Generic Security Service Application Program Interface(GSS- API) Mechanism: Version 2 [S]. Fremont, CA: IETF, 2005. 被引量:1
  • 10Flousley R, Polk W, Ford W, et al. Internet X. 509 Public Key Infrastructure lertificate and Certificate Revocation List (CRL) Profile [S]. Fremont, CA: IETF, 2002. 被引量:1

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部