期刊文献+

一种可信任的网络安全模型

A TRUSTABLE NETWORK SECURITY MODEL
下载PDF
导出
摘要 随着网络的高速发展,其数据传输的安全性成为网络研究的热点。本文从系统结构的角度出发,提出了一种可以对系统传输的数据流提供保护的可信任的网络安全模型。该模型不仅提供了一种可信任的、可扩展的分层式Internet身份认证机制(分层式公钥分配架构);而且还提供一种动态检测机制来确认对方的活性,从而避免了无效数据的传输;模型还通过在网络层与链路层之间嵌入一个安全模块来实现对数据的安全处理。实验结果表明,该模型具有很强的安全性和有效性。 With the rapid development of network, most research is focused on the security of data in the Intemet. This paper presents a novel trustable model of network security that can protect the data stream transferred in the network. In this model, we not only bring forward a trustable extensible identification strategy that is a hierarchy, but also provide a dynamically detecting method to verify the liveliness of opposite peer that can avoid the network congestion. A secure layer that implements the encapsulation the data is inserted between the network layer and the link one. The experimental results show that our model can work very well.
作者 张峰 叶澄清
出处 《计算机应用与软件》 CSCD 北大核心 2005年第11期108-111,130,共5页 Computer Applications and Software
关键词 网络安全模型 数据传输 系统结构 信任度 安全模块 身份认证机制 分配架构 Network security Liveliness IP security protocol Trusty Security module
  • 相关文献

参考文献14

  • 1Diffie W.Hellman M.,New Directions in Cryptography,IEEE Transactions on Information Theory,Nov.1976,Vol.IT-22,pp.644~654.
  • 2R.Housley,W.Ford,W.Polk,D.Solo,Internet X.509 Public Key Infrastructure Certificate and CRL Profile.RFC 2459,January 1999.
  • 3Chokhani S.,Towards a national public key infrastructure,IEEE Communication Magzine,1994,32(9):70~75.
  • 4Harkins D.Carrel D.,The Internet Key Exchange(IKE).RFC 2409,November 1998.
  • 5Kent S.Atkison R.,Security Architecture for the Internet Protocol,RFC2401,November 1998.
  • 6Maughan D.Schertler M.et al.,Internet Security Association and Key Management Protocol(ISAKMP),RFC 2408,November 1998.
  • 7Rivest R.,The MD5 Message-Digest Algorithm.RFC 1321,April 1992.
  • 8National Institute of Standards and Technology,U.S.Department of Commerce.Secure Hash Standard.document FIPS-180-1,April 1995.
  • 9Krawczy H.Bellare M.Canetti R.,HAMC:Keyed-Hashing for Message Authentication.RFC 2104,February 1997.
  • 10Kent S.Atkison R.,IP Authentication Header.RFC 2402,November 1998.

二级参考文献8

  • 1FERGUSON P, HUSTON G. What is a VPN? [DB/OL]. http://www.employees.org:80/-ferguson/vpn.pdf, April 1998.
  • 2KENT S, ATKISON R. Security Architecture for the Intemet Protocol[S]. RFC 2401, November 1998.
  • 3HARKINS D, CARREL D. The Intemet Key Exchange(IKE)[S]. RFC 2409, November 1998.
  • 4WAHL M, KILLE S, HOWES T. Lightweight Directory Access Protocol(v3)[S]. RFC 2251, December 1997.
  • 5Microsoft Corporation. Microsoft Windows driver development kits[DB/OL].http://www.microsoft.com/ddk/.
  • 6KENT S, ATKINSON R. IP Encapsulating Security Payload[S]. RFC 2406, November 1998.
  • 7KENT S, ATKINSON R. IP Authentication Header[S]. RFC 2402, November 1998.
  • 8赵阿群,吉逸,顾冠群.支持VPN的隧道技术研究[J].通信学报,2000,21(6):85-91. 被引量:29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部