期刊文献+

基于PMI的虚拟专用网的架构设计

Designing a Framework for PMI based Virtual Private Networks (VPN)
下载PDF
导出
摘要 虚拟专用网(VPN)作为一个广泛应用的技术,隧道传输安全性与用户认证是关系到虚拟专用网安全的两个核心内容。传统的基于用户名和密码的认证措施容易发生被窃取的情况,另外VPN本身对权限的等级分配也未作考虑,需要其他技术的支持。而特权管理基础设施(PMI)作为认证与授权的一个新型的以PKI基础建立的技术,正好满足VPN对用户管理的需求。本文提出的基于PMI的VPN架构,具有较好的应用价值。 Virtual Private Network (VPN) as a popular application in enterprise internet working, its tunnel security and user authentication are the main considerations. The traditional user/password authentication policy is vulnerable. Furthermore, VPN itself takes little consideration to privilege management; it needs other additional technologies' support. Privilege Management Infrastructure (PMI), as a PKI based authenti- cation and authorization technology, just satisfies the need for VPN user management. This article intro- duces a PMI based VPN infrastructure, which is a valuable solution for secure VPN applications.
出处 《现代计算机》 2005年第6期28-30,共3页 Modern Computer
关键词 虚拟专用网 PMI 架构设计 特权管理基础设施 VPN 核心内容 用户认证 用户管理 应用价值 技术 安全性 用户名 PKI 权限 Virtual Private Network (VPN) Privilege Management Infrastructure (PMI)
  • 相关文献

参考文献5

  • 1ITU-T Rec. X.509(2000). ISO/IEC 9594-8. The Directory: Authentication Framework, 2000.
  • 2An Internet Attribute Certificate Profile for Authorization.www.ieff.org.
  • 3.PMI技术白皮书[EB/OL].www.jit.com.cn.,.
  • 4王秀琴,马文革.基于CA的安全通信系统的设计[J].计算机应用,2001,21(10):84-85. 被引量:5
  • 5Microsoft Windows 2000 Public Key Infrastructure.www.microsoft.com.2000.

二级参考文献5

  • 1[1]RSA Laboratories, Frequently Asked Questions About Today ′ s Cryptography[S], September 1995.
  • 2[2]D. Wagner, B. Schneier. Analysis of the SSL 3. 0 Protocol [R],November 1996.
  • 3[3]TWG-98-07, Public Key Infrastructure (PKI) Federal X. 509Certificate Profile[S], March 1998.
  • 4[4]W.E. Burr. TWG-98-59, Public Key Infrastructure (PKI) Technical Specifications [S], 1998.
  • 5[5]Todd Stauffer. QUE Corporation, HTML by Example[S], 1996.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部