期刊文献+

基于身份的网格安全体系结构研究 被引量:3

Research on ID-based Grid Security Architecture
下载PDF
导出
摘要 为了克服PKI证书机制对GSI规模化发展的制约,在分析GSI中证书机制局限性的基础上,将HIBC引入到GSI中,使用HIBC签名方案代替GSI中的PKI数字签名并进行扩展,提出一种基于身份的网格安全体系结构IBGSI(ID-based GSI),进而给出了结合HIBC方案改进TLS握手协议的方法,并通过一组协议控制下的实体交互过程定义IBGSI的协议结构。从分层身份结构、认证结构和协议结构三个方面对IBGSI进行了研究,研究结果表明IBGSI融合了GSI与IBC的优势,能够重用GSI的安全服务且便于部署,并获得IBC轻量、高效的优点。 In order to improve the scalability of GSI which is restricted by PKI s certification mechanism,a grid security architecture named IBGSI(ID-Based GSI) was proposed,in which PKI signature scheme was substituted by HIBC signature scheme.Furthermore,TLS handshake protocol was improved to fit HIBC scheme.At last,IBGSI s protocol architecture was defined by designing a set of entity interaction operation sequences.Three aspects of IBGSI,hierarchical identity architecture,authentication architecture and protocol ...
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2009年第2期200-205,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家自然科学基金资助项目(606731 6060573065) 济南大学信息学院科研基金资助项目(Y0809) 济南大学博士科研启动基金资助项目(B0626)
关键词 网格 安全体系结构 IBC(ID-Based Cryptography) HIBC(Hierarchical ID-BASED Cryptography) GSI(Grid Security Infrastructure) Grid security architecture IBC(ID-Based Cryptography) HIBC(Hierarchical ID-Based Cryptography) GSI(Grid Security Infrastructure)
  • 相关文献

参考文献1

二级参考文献16

  • 1ANSI X. 962. Public key cryptography for the financial services industry:the elliptic curve digital signature algorithm (ECDSA) [ S ]. 1999.
  • 2Shamus software ltd, multiprecision integer and rational arithmetic C/C ++ library [OL]. http ://indigo. ie/-mscott/.
  • 3R Butler, V Welch, D Engert, I Foster, S Tuecke, J Volmer, C Kesselman. A national-scale authentication infrastructure [ J ]. IEEE Computer, 2000,33 ( 12 ) : 60 -66.
  • 4I Foster, C Kesselman,G Tsudik, S Tuecke. A security architecture for computational GRID [ A ]. In Proceedings of the 5th ACM Conference on Computer and Communications Security [ C ]. New York: ACM press,1998, 83 - 92.
  • 5M Thompson, A Essiari, S Mudumbai. Certificate-based authorization policy in a PKI environment [ J ]. ACM Transactions on Information and System Security,2003,6(4) :566 -588.
  • 6N Nagaratnam, P Janson, J Dayka, A Nadalin, F Siebenlist,V Welch, I Foster, S Tuecke. The security architecture for open GRID services[OL]. http://www. cs.virginia.edu/-humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07192002. pdf. July ,2002.
  • 7P Gutmann. PKI: it's not dead, just resting [ J ]. IEEE Computer,2002,35(8) :41 -49.
  • 8J Linn, M Branchaud. An examination of asserted PKI issues and proposed alternatives[ A]. In Proceedings of the 3rd Annual PKI R & D Workshop [ C ]. Gaithers-burg : NIST ,2004.
  • 9W Mao. An identity-based non-interactive authentication framework for computational grids [ R ]. Hewlett-Packard Laboratories,technical report HPL-2004-096,2004.
  • 10A Shamir. Identity-based cryptosystems and signature schemes [A]. In Advances in Cryptology-Crypto'84[C]. Berlin: Springer-Verlag, 1984.47 - 53.

共引文献31

同被引文献33

  • 1王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 2陈建刚,王汝传,王海艳.网格资源访问的一种主观信任机制[J].电子学报,2006,34(5):817-821. 被引量:14
  • 3CHEN Jian-gang WANG Ru-chuan WANG Hai-yan.The extended RBAC model based on grid computing[J].The Journal of China Universities of Posts and Telecommunications,2006,13(3):93-97. 被引量:5
  • 4Zhang Lin,Wang Ru chuan,Wang Hai yan.Trusted decision mechanism based on fuzzy logic for open network[J].Journal of Computers,2008,3(12):76-83.
  • 5侯盂波,徐秋亮,郭山清.基于无证书的两方认证密钥协商协议[J].软件学报,2009,20(增刊):321-329.
  • 6Shamir A. Identity-based cryptosystems and signature schemes [ C ]//Proceedings of CRYPTO 1984. LNCS 196, Berlin : Springer-Verlag, 1985:47 - 53.
  • 7Boneh D, FrankZin M. Identity-based encryption from the well pairing [ C ]//Proceedings of CRYPTO 2001. LNCS 2139, Berlin : Springer-Verlag,2001:213 - 229.
  • 8Chen Liqun, Cheng Zhaohui, Smart N P. Identity-based key agreement protocols from pairings [ J ]. International Jour- nal of Information Security,2007,6 (4) :213 - 241.
  • 9A1-Riyami S S, Paterson K G. Certificateless public key cryptography [ C ]//Proceedings of ASIACRYPT, 2003. LNCS 2894, Berlin: Springer-Verlag,2003:452 - 473.
  • 10Swanson C, Jao D. A study of two-party certificateless au- thenticated key agreement protocols [ C ]//Proceedings of INDOCRYF'T 2009. LNCS 5922, Berlin: Springer-Verlag, 2009 : 57 - 71.

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部