期刊文献+

网络环境下基于PKI与访问控制的身份代理算法

AN IDENTITY PROXY ALGORITHM BASED ON PKI AND ACCESS CONTROL IN NETWORK ENVIRONMENT
下载PDF
导出
摘要 本文介绍了一个适用于网络分布式环境的身份代理算法。采用基于离散对数问题的公钥密码体系生成身份代理数字证书涉及的密钥对。该研究结合基于角色的访问控制与公钥基础设施(PKI),设计了一个安全的、易于配置与管理、独立于程序的信息访问控制策略。与传统的基于用户和口令的访问控制方案比较,基于角色的访问控制能明显地简化网络分布式系统的安全管理。使用关联角色访问控制的身份代理证书为系统内受控的用户角色转换提供了很大的灵活性。 This paper presents an identity proxy algorithm suitable for distributed network environment.The key pair related to identity proxy certificate is generated by a public-key cryptosystem based on discrete logarithm problem.A secure,easy to configure and manage,independent of program information access control policy is designed by combining RBAC(role based access control)with PKI(public key infrastructure).In comparison with the conventional user and password based approach,RBAC can obviously simplify the security management of distributed network system.The identity proxy certificate associating RBAC provides great flexibility for controlled transfer of user's role in the system.
出处 《计算机应用与软件》 CSCD 北大核心 2005年第6期104-107,共4页 Computer Applications and Software
  • 相关文献

参考文献10

  • 1罗晓广 曾钟建.Linux网络应用教程[M].北京:电子工业出版社,1999..
  • 2卢开澄.计算机密础学[M].北京:清华大学出版社,1998.206-216.
  • 3DouglasR Stinson 冯登围(译).密码学原理与实践[M].北京:电子工业出版社,2003.233-262.
  • 4JessGarms.Java安全性编程指南[M].电子工业出版社,2002..
  • 5W.Diffie and M. E. Hellman, New directions in myptography [J], IEEE Trans. Inform. Theory, 1976, IT - 22 ( 6 ) :644 - 654.
  • 65t. Mambo, K. Usuda, and E. Okamoto. Proxy Signaturc : Dclegation of the Power to Sign Messages [ J ]. 1EICE Trans. Fundamentals, 1996,E79 - A(9) :1338 - 1353.
  • 7L. Yi ,G. Bai,and G. Xiao. Proxy multi-signature scheme:a new type of proxy signature scheme [ J ]. Electronics Letters ,2000, Vol. 36 (6) :527-528.
  • 8B. Lee,H. Kim,and K. Kim. Strong Proxy Signature and its Applications[ C ]. In : Proc. of SCIS 2001,603-608, Oiso(Japan) ,2001.
  • 9S. Kim,S. Park and D. Won. Proxy signature revisited[C]. In Proc. of ICICS'97,Inter. Conf. on Information and Communications Security,LNCS 1334,223-232 ,Spmger, 1997.
  • 10T. E1Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms [ J ]. IEEE Trans. Inform. Theory. 1985,31:469 - 472.

共引文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部