期刊文献+

基于应用协议的应用环境隔离安全系统

Security system of application environment isolation based on application protocols
下载PDF
导出
摘要 提出了以安全管理中心和密码中心为基础、以用户真实身份认证为核心、以访问权限检验为手段的应用环境隔离安全体系结构。在给出三个系统安全公理的基础上 。 An application environment isolation security architecture was put forward. Security administration center and cryptograph administration center were used as its foundation, user real identity authentication was its core, and the access permission verification was its means. Based on the three system security axiom, we presented formally the basic security rules for access permission verification in application environment isolation security system.
出处 《计算机应用》 CSCD 北大核心 2004年第8期113-116,共4页 journal of Computer Applications
基金 国家 973计划项目 (G1 9990 3580 1 ) 国家 863计划项目 (2 0 0 2AA1 4 4 0 2 0 )
关键词 应用环境 隔离 访问控制 安全体系结构 应用区域边界 application environment isolation access control security architecture application enclave boundary
  • 相关文献

参考文献8

  • 1[1]Allen B. Hamilton:Information Assurance Technical Framework Release 3.0 [R]. National security agency information assurance solution technical directors, 2000.
  • 2吕述望,王挺.现代密码技术的应用局限[J].计算机应用研究,2000,17(7):10-11. 被引量:10
  • 3朱鲁华,沈昌祥,等.涉密网的物理隔离问题[J].电子计算机,2002(1):16-19. 被引量:3
  • 4赵泽良,沈昌祥.基于VPN的网络隔离[J].信息安全与通信保密,2002(2):32-34. 被引量:2
  • 5[5]Srinivasan V, Varghese G. Fast and Scalable Layer Four Switching[A]. Proceedings of ACM SIGCOMM98[C],1998.191-202.
  • 6[6]McQuillan J. Layer 4 Switching[J]. Data Communications, 1997,(10).
  • 7[7]LaPadula LJ, Bell DE. Secure Computer Systems: A Mathematical Model[EB/OL]. http://citeseer.ist.psu.edu/529524.html,2004-03.
  • 8[8]LaPadula LJ, Bell DE. Secure Computer Systems: Mathematical Foundations[EB/OL]. http://citeseer.ist.psu.edu/548063.html,2004-03.

二级参考文献15

  • 11,Shannon,C.E. Communication Theory of Secrecy System, Bell System Technical Journal, Vol.28, pp.656~715,1949
  • 22,W. Diffie and M.E. Hellman, New Directions in Cryptography, IEEE Transactions in Information Theory, volume IT-22, pp.644~654, November 1976
  • 33,NBS, Data Encryption Standard, FIPS PUB46, National Bureau of Standards, Washington, D.C., Jan.1977
  • 44,Agnew,G.B. Random Sources for Cryptographic Systems, Advances in Cryptology-EUROCRYPT'87 Proceedings, pp.77~81, Springer-Verlag, 1988
  • 55,Miche MOULY, Marie-Bernadette PAUTET, The GSM System for Mobile Communication, 1992
  • 66,National Institute of Standards and Technology, Announcing Request For Candidate Algorithm Nominations for The Advanced Encryption Standard (AES)
  • 77,Dr. Bill Hancock, CISSP, Elliptical Curve Cryptography and Standards for Efficient Cryptography Group, Computers & Security, pp.4~15, 18(1999)
  • 88,ANSI X9.62, Public Key Cryptography for the Financial Services Industry - the Elliptic Curve Digital Signature Algorithm (ECDSA), draft, 1997
  • 99,ANSI X9.63, Public Key Cryptography for the Financial Services Industry - Elliptic Curve Key Agreement and Transport Protocols, draft, 1997
  • 1010,IEEE P1363, Standard Specifications for Public-Key Cryptography, draft, 1997

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部