期刊文献+

基于Kerberos 5受限代理的实现与应用

The Implementation and Application of Restricted Proxy Based on Kerberos 5
下载PDF
导出
摘要 讨论了在Kerberos 5鉴别系统中受限代理的实现和应用问题 为了在网络环境下实现分布式授权和记账机制 ,首先介绍了受限代理模型 ,分析了基于公开密钥和对称密钥机制的鉴别系统实现受限代理的方法 ,特别强调了在Kerberos 5中实现受限代理的相关问题 由于鉴别、授权和记账服务之间存在紧密联系 ,最后将受限代理应用于分布式授权和记账服务中 。 The issue of implementation and applicaton of restricted proxy based on Kerberos 5 is discussed in this paper. In order to realize distributed authorization and accounting in nework environment, the model of restricted proxy is introduced first. It is analyzed that the implementation methods of restricted proxy based on authentication system which using public key cryptography and symmetrical key cryptography, and problems to realize proxy in Kerberos 5 and emphasized. As authorization and accounting are closely related to authentication, the restricted proxy is applied in the area of authorization and accounting last, which provides a vehicle for implementing authorization and accounting mechanisms in distributed systems.
作者 刘蔚林
出处 《怀化学院学报》 2003年第2期62-66,共5页 Journal of Huaihua University
关键词 Kerberos5 受限代理 分布式授权 记账机制 身份鉴别 公开密钥机制 对称密钥机制 restricted proxy authorization accounting authentication
  • 相关文献

参考文献4

  • 1Morrie Gasser,Andy Goldstein,Charlie Kaufman,Butler Lampson.The Digital Distributed System Security Architecture[].Proceedings of the National Computer Security Conference.1989
  • 2S. P. Miller,B. C. Neuman,J. I. Schiller,and J. H. Saltzer.Kerberos authentication and authorization system[]..1987
  • 3PaulA Karger.Authenticationanddiscretionaryaccesscontrolincomputernetworks[].Computer Networks.1985
  • 4KarenR Solins.Cascadedauthentication[].ProceedingoftheIEEEsymposiumonResearchinSecurityandPrivacy.1988

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部