期刊文献+

基于CPK的虚拟桌面系统认证方法研究 被引量:2

Research on Virtual Desktop System Authentication Method Based on CPK
下载PDF
导出
摘要 虚拟桌面技术将用户与资源分离,有助于终端安全的解决和资源利用率的提高,也为资源的集中管理提供了便利,但虚拟化技术的引入也使得虚拟桌面存在其特有的安全隐患。身份认证是解决虚拟桌面安全问题的关键技术,也是实施更复杂和细粒度的安全防护措施的基础。首先介绍了组合公钥CPK的基本原理,然后针对虚拟桌面的特点,基于CPK给出了虚拟资源申请和虚拟资源应用两种场景下的身份认证方法,并通过联合标识实现了用户与虚拟资源的绑定,最后给出了所提方法的安全性和实用性分析。 Virtual desktop technology separates the users and the resources,contributing to terminal security solutions and improvement of resource utilization.It also provides the convenience for the centralized management of resources,but the introduction of virtualization technology also makes unique safety risks exist in virtual desktop.Identity authentication is the key technology to solve the problem of virtual desktop security problems and also is the foundation of more complex and fine-grained security protective measures.This article first described the basic principle of the combined public key(CPK)cryptosystems,and then according to the characteristics of the virtual desktop,based on CPK authentication methods was proposed under applying the virtual resources and using virtual resources two scenarios.Through the federated identity,the binding of the user and the virtual machine comes ture.At last,the safety and performance analysis of the proposed authentication method was given.
出处 《计算机科学》 CSCD 北大核心 2015年第S1期399-401,共3页 Computer Science
基金 中央高校基本科研业务费(YZDJ1202)资助
关键词 虚拟桌面 身份认证 组合公钥 联合标识 Virtual desktop,Identity authentication,Combined public key,Federated identity
  • 相关文献

参考文献6

二级参考文献35

  • 1李元兴,王新梅.密钥分散管理方案与线性分组码[J].通信学报,1993,14(3):22-28. 被引量:17
  • 2郑宇,何大可,何明星.基于可信计算的移动终端用户认证方案[J].计算机学报,2006,29(8):1255-1264. 被引量:40
  • 3南相浩.CPK算法与标识认证[J].信息安全与通信保密,2006,28(9):12-16. 被引量:30
  • 4南相浩.“认证”有关问题的讨论[J].计算机安全,2006(9):34-34. 被引量:2
  • 5Trusted Computing Group.TPM main specification version 1.2[EB/OL]. (2007-08-08).http://www.trustedcomputinggroup.org. 被引量:1
  • 6George P.User authentication with smart cards in trusted computing architecture[C]//Proceedings of the International Conference on Security and Management, Las Vegas, Nevada, USA,2004: 25-31. 被引量:1
  • 7Thayer F,Herzog J C,Guttman J D.Strand space:Why is a security protocol correct?[C]//Proceedings of 1998 IEEE Symposium on Security and Privacy.Oakland :IEEE Computer Society Press, 1998: 160-171. 被引量:1
  • 8I_owe G.A hierarchy of authentication specification[C]//Proceedings of 10th Computer Security Foundations Workshop.[S.l.]:IEEE Computer Society Press, 1997:31-43. 被引量:1
  • 9Guttman J D,Thayer F J.Authentication tests[C]//Proceedings of IEEE Symposium on Security and Privacy,Oakland CA,2000:96-109. 被引量:1
  • 10Guttman J D.Security protocol design via authentication tests[C]// Proceedings of the 15th IEEE Computer Security Foundations Workshop.[S.l.]:IEEE Computer Society Press,2002:92-103. 被引量:1

共引文献66

同被引文献24

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部