期刊文献+

一种基于Internet的同步协同CAD/CAM系统的安全机制 被引量:2

A Security Mechanism for Internet-Based Synchronous Collaborative CAD/CAM System
下载PDF
导出
摘要 介绍了同步协同CAD/CAM系统C-Superman的体系结构,在分析系统运行中面临的潜在安全威胁和运行要求的基础上,提出了一套适用于该类系统的安全机制.文中构造了同步协同CAD/CAM系统的4层安全参考模型,结合C-Superman的安全过程模型,使用两次SHA-1散列运算进行用户身份的认证,并基于AES和RSA混合加密体制实现了数据的安全传输,同时兼顾了协同会话的同步性要求. The architecture of a synchronous collaborative CAD/CAM system C-Superman is first introduced in this paper. Next, by analyzing the latent security threats and the running requirements of C-Superman, a security mechanism for this kind of system is presented. Then, a four-tier security reference model for the synchronous collaborative CAD/CAM system is constructed. Moreover, according to the security process model of C-Superman, SHA-1 hash algorithm is used twice for the identity authentication, and the transport security of data is finally implemented by using a mixed encryption method of AES and RSA, giving consideration to the synchronization of the collaborative conversation.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2005年第9期20-24,共5页 Journal of South China University of Technology(Natural Science Edition)
基金 教育部高等学校优秀青年教师教学科研奖励计划资助项目 江苏省青年科技基金资助项目(BQ2000004)
关键词 协同CAD/CAM 安全 身份认证 加密 传输安全 collaborative CAD/CAM security identity authentication encryption transport security
  • 相关文献

参考文献5

  • 1Osorio A L,Barata M M. Reliable and secure communications infrastructure for virtual enterprises [J]. Journal of Intelligent Manufacturing,2001,12 (2): 171 - 183.
  • 2鲍江宏.安全支持提供者接口在网络安全通信中的应用[J].华南理工大学学报(自然科学版),2002,30(6):61-64. 被引量:1
  • 3Liu Wei-wei, Zhou Lai-shui, Zhuang Hai-jun. C-Superman: A web-based synchronous collaborative CAD/CAM system [A]. The Eighth International Conference on CSCW in Design [C]. Xiamen,2004. 437 -442.
  • 4Mirkovic Jelena, Dietrich Sven, Dittrich David, et al. Internet Denial of Service: Attack and Defense Mechanisms[M]. Indiana: Prentice Hall PTR ,2005.
  • 5Yeh Jyh-haw,Chow Randy,Newman Richard. Key assignment for enforcing access control policy exceptions in distributed systems [J]. Information Sciences, 2003, 152:63 - 88.

二级参考文献2

同被引文献5

  • 1WadeTrappe LawrenceCWashington 邹红霞 许鹏文 李勇奇译.密码学概论[M].北京:人民邮电出版社,2004.6.
  • 2刘启源 刘怡.数据库与信息系统的安全[M].北京:科学出版社,2000..
  • 3Mao Wenbo.现代密码学理论与实践[M].北京:电子工业出版社,2004.
  • 4Yeh Jyh-haw, Chow Randy, Newman Richard. Key assignment for enforcing access control policy exceptions in distributed systems[J].Information Sciences,2004,152:63-88.
  • 5唐韶华,马卫华,欧国华.一种安全的分布式用户认证方案[J].华南理工大学学报(自然科学版),1999,27(6):1-5. 被引量:4

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部