期刊文献+

基于Web的RAP安全认证方案

A Web-based RAP Security Authentication Scheme
下载PDF
导出
摘要 该文介绍了一种新的基于Web的安全远程访问解决方案:安全远程控制系统RAP(RemoteAccessPass)。文章概述了RAP的安全需求,并根据RAP基于Web的特征以及系统模型自身的特点,给出了一种C/S结构的分布式安全认证模型,并设计了基于消息认证码MAC技术的安全认证方案,最后对认证方案的安全性进行了分析和讨论。该方案在不改变防火墙和内部架构的基础上,实现了内部信息系统对外部访问者的安全认证。 RAP(Remote Access Pass) introduced in this paper is a new solution of Web-based security remote access.The paper summarizes the security requirements of RAP.According to the characters of the system module and the Web-based RAP,the paper designs a distributed security authentication module with the C/S module and proposes a MAC-based security authentication scheme.At last,it discusses and analyzes the security of the scheme above.Without changing the structure of the firewall and internal network,the scheme realizes the security authentication for outer visitor of internal information system?
作者 洪帆 祝伟
出处 《计算机工程与应用》 CSCD 北大核心 2005年第15期176-179,共4页 Computer Engineering and Applications
关键词 远程控制 遥访门 安全认证 安全套接层 MD5 remote control,Remote Access Pass(RAP),security authentication,SSL,MD5
  • 相关文献

参考文献4

  • 1白跃彬,刘轶,郑守淇,侯宗浩.远程访问安全认证方案的设计与分析[J].西安交通大学学报,2001,35(8):829-833. 被引量:5
  • 2Touch J D.Performance analysis of MDS[J].ACM Computer Communication Review, 1995 ; 25 (4) : 77-86.
  • 3Bellare M,Canetti R,Krawczyk H.Keying Hash functions for message authentication[C].In :Lecture Notes in Computer Science:Advances in Crytology- CRYPTO' 96, Berlin: Springer, 1996:1 - 15.
  • 4Preneel B,Van O.MD2x MAC and building fast MACs from Hash functions[C].In:Lecture Notes in Computer Science:Advances in Cryp-tology-CRYPTO ' 95, Berlin: Springer, 1995 : 53-56.

二级参考文献6

  • 1[1]Prabhu M M, Raghavan S V. Security in computer networks and distributed systems [J].Computer Communications,1996,19(4):378~388.
  • 2[2]Fisch E A, White G B. Secure computers and networks-analysis, design and implementation[M].New York:CRC Press,2000.
  • 3[3]Stallings W. Network and internetwork security: principles and practice[M].New York:Prentice-Hall Inc,1996.
  • 4[4]Touch J D.Performance analysis of MD5 [J].ACM Computer Communication Review,1995,25(4):77~86.
  • 5[5]Bellare M, Canetti R, Krawczyk H. Keying Hash functions for message authentication[A].Lecture Notes in Computer Science: Advances in Crytology-CRYPTO'96 [C].Berlin:Springer,1996.1~15.
  • 6[6]Preneel B,Van O. MD-x MAC and building fast MACs from Hash functions [A]. Lecture Notes in Computer Science : Advances in Cryptology-CRYPTO'95 [C].Berlin : Springer,1995.53~56.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部