期刊文献+

网格环境下基于身份的跨域认证研究 被引量:13

Study on Identity-based Cross-domain Authentication in Grid Environment
下载PDF
导出
摘要 在网格安全标准中,实体间的跨域身份认证采用基于证书的公钥基础设施认证框架,证书的管理过于复杂,限制了网格规模的扩大。针对上述问题,在分析网格安全需求的基础上,引入基于身份的密码体制,提出一种跨域签密方案,以解决使用不同系统参数的虚拟组织间相互认证的问题,并对其安全性和性能进行分析。 In Grid Security Infrastructure(GSl), cross-domain authentication between entities adopts the traditional certificate-based Public Key Infrastructure(PKI) which limits grid scale since the management of certificates is too complicated. By analyzing the security demands, this paper introduces Identity-Based Cryptography(IBC) to grid and proposes a cross-domain signcryption scheme to solve the problem brought by authentication between Virtual Organizations(VO) with different system parameters. Its security and performance are analyzed.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第17期160-162,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2006AA01Z457)
关键词 网格 基于身份的密码体制 签密 认证 grid Identity-Based Cryptography(IBC) signcryption authentication
  • 相关文献

参考文献5

  • 1Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids[C]//Proceedings of the 5th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1998: 83-92. 被引量:1
  • 2Wenbo M. An Identity-based Non-interactive Authentication Framework for Computational Grids[R]. Hewlett-Packard Laboratories, Technical Report: HPL-2004-096, 2004. 被引量:1
  • 3路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 4杨浩淼,孙世新,徐继友.一种制造网格环境下的用户代理的签名方案[J].计算机集成制造系统,2007,13(11):2276-2283. 被引量:1
  • 5Li Hongwei, Sun Shixin. Identity-Based Cryptography for Grid[C]// Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing. Washington, USA: IEEE Computer Society 2007: 132-137. 被引量:1

二级参考文献32

  • 1叶作亮,顾新建,钱亚东,祁国宁.制造网格——网格技术在制造业中的应用[J].中国机械工程,2004,15(19):1717-1720. 被引量:30
  • 2ANSI X. 962. Public key cryptography for the financial services industry:the elliptic curve digital signature algorithm (ECDSA) [ S ]. 1999. 被引量:1
  • 3Shamus software ltd, multiprecision integer and rational arithmetic C/C ++ library [OL]. http ://indigo. ie/-mscott/. 被引量:1
  • 4R Butler, V Welch, D Engert, I Foster, S Tuecke, J Volmer, C Kesselman. A national-scale authentication infrastructure [ J ]. IEEE Computer, 2000,33 ( 12 ) : 60 -66. 被引量:1
  • 5I Foster, C Kesselman,G Tsudik, S Tuecke. A security architecture for computational GRID [ A ]. In Proceedings of the 5th ACM Conference on Computer and Communications Security [ C ]. New York: ACM press,1998, 83 - 92. 被引量:1
  • 6M Thompson, A Essiari, S Mudumbai. Certificate-based authorization policy in a PKI environment [ J ]. ACM Transactions on Information and System Security,2003,6(4) :566 -588. 被引量:1
  • 7N Nagaratnam, P Janson, J Dayka, A Nadalin, F Siebenlist,V Welch, I Foster, S Tuecke. The security architecture for open GRID services[OL]. http://www. cs.virginia.edu/-humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07192002. pdf. July ,2002. 被引量:1
  • 8P Gutmann. PKI: it's not dead, just resting [ J ]. IEEE Computer,2002,35(8) :41 -49. 被引量:1
  • 9J Linn, M Branchaud. An examination of asserted PKI issues and proposed alternatives[ A]. In Proceedings of the 3rd Annual PKI R & D Workshop [ C ]. Gaithers-burg : NIST ,2004. 被引量:1
  • 10W Mao. An identity-based non-interactive authentication framework for computational grids [ R ]. Hewlett-Packard Laboratories,technical report HPL-2004-096,2004. 被引量:1

共引文献31

同被引文献111

引证文献13

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部