期刊文献+

网络安全与代理技术 被引量:9

Network Security and the Proxy
下载PDF
导出
摘要 Internet的 TCP/IP协议缺乏有效的安全机制,极易受到各种攻击。中心分别基于公钥基础设施 PKI(PublicKey Infrastructure)和Kerberos协议为园区网环境设计并开发了两个安全系统平台,该文主要描述这两平台的安全代理,文章将说明使用代理机制可以灵活且透明地实现网络应用的安全化。文章最后还讨论了WWW的安全方案。 The Internet is vulnerable to be attacked,and lacks effective security mechanisms below the application layer.We have developed two security system platforms based on PKI (Public Key InfrastrUcture)and Kerberos Protocol for the campus network environment.This paper presents the proxy components of the two systems.It shows that the proxy can be used to implement secure applications flexibly and transparently.Also the security approaches for WWW are discussed.
作者 孔雷 赵锦蓉
出处 《计算机工程与应用》 CSCD 北大核心 2001年第14期58-61,共4页 Computer Engineering and Applications
关键词 代理技术 身份认证 KERBEROS 公钥基础设施 WWW Proxy, Authentication, Kerberos, PKI, WWW
  • 相关文献

参考文献8

  • 1[1]B Harris,R Hunt. TCP/IP Security threats and attack methods[J].Computer communications, 1999;22:885-897
  • 2[2]ITU-T Recommendation X.509.The Directory-Authentication Framework, 1997.6
  • 3[3]J Kohl ,B Neuman.The Kerberos Network Authentication Service(V5)[S].RFC1510,1993.9
  • 4[4]S Kent,R Atkinson. Security Architecture for the Internet Protocol[S].RFC2401,1998.11
  • 5[5]A Frier,P Karlton,P Kocher. The SSL 3.0 Protocol[M].Netscape Communications Corp., 1996.11
  • 6[6]B C Soh,S Yong. Network system and world wide web security[J].Computer communications, 1998;20:1431-1436
  • 7[7]Paul Wing,Brian O'Higgins. Using Public-Key Infrastructures for Security and Risk Management[J].IEEE Communications Magazine, 1999.9
  • 8[8]Ray Hunt.Intemet/Intranet firewall security-policy,architecture and transaction services[J].Computer communications, 1998;21:1107-1123

同被引文献40

  • 1孟万化,傅蓉心.ISA代理服务器在现代教育网络中的若干主要技术问题[J].计算机系统应用,2004,13(5):35-36. 被引量:1
  • 2徐英健.新一代工控机标准-MIC-2000[J].电子产品世界,1996,3(7):65-65. 被引量:1
  • 3[2]赛迪顾问.中国电子政务趋势分析[EB/OL]. http://software. ccidnet. com/pub/disp,2002 - 08 - 26.
  • 4[1]张世永.网络安全原理与应用[M].北京:北京科学出版社,2002.
  • 5[3]S.Kent,R.Atkinson.Security Architecture for the Internet Protocal[M].RFC 2401,1998.
  • 6[4]莫瑞·加瑟.计算机安全的技术与方法[M].吴亚菲等译.北京:电子工业出版社,1992.
  • 7R Housley,W Ford,W Polk et al.Internet X.509 Public Key Infrastructure Certificate and CRL Profile[S].RFC2459,1999
  • 8R Perlman.An Overview of PKI Trust Models[J].IEEE Network, 1999;13(6) :38-43
  • 9B J Desind,T M Sharick,J P Long. Development of a Public Key Infrastructure across Multiple Enterprises[J].Journal of Engineering and Applied Science, 1997; (18-20) :214-219
  • 10RSA Laboratories. PKCS #10 v1.7:Certification Request Syntax Standard[S].2000.4

引证文献9

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部