期刊文献+

一种采用信任管理策略的安全家庭网关

Secure Home Gateway Using Trust Management Strategy
下载PDF
导出
摘要 随着In ternet向普通家庭生活不断扩展,电子设备、计算机和通讯一体化日趋明显,与此同时基于W eb的应用系统越来越复杂,传统的解决方法已经不能满足软件的安全需要.本文剖析了目前信任管理方法和家庭网关技术的内在机制,并具体分析了基于O SG i网关的安全性问题,提出了将信认管理的认证策略集成到基于O SG i家庭网关架构中的解决方法,最后给出了具体的框架分析、详细设计与有关实现和性能测试. With the extending of Internet to ordinary house,the incorporate trend of consumer electronics,computer and communication is becoming distinct. And the web-based applications are becoming more and more complex, so it can't solve the secure requirements of current software by traditional methods. The paper studies trust management strategy,the mechanisms of home gateway and concretely analyses the secure problems of OSGi-based gateway. Then it puts forwards the method of OSGi- based home gateway integrating trust management strategy. Finally it gives frondose analysis and design of framework,relative implementation and performance evaluation.
出处 《小型微型计算机系统》 CSCD 北大核心 2005年第12期2087-2091,共5页 Journal of Chinese Computer Systems
基金 国家"八六三"高技术研究发展计划软件专项基金(2003AA1Z1120)资助
关键词 信任管理 WEB安全 家庭网关 OSGI SPKI trust management web security home gateway OSGi (Open Services Gateway Initiative) SPKI (Simple Public Key Infrastructure)
  • 相关文献

参考文献12

  • 1Open Services Gateway Initiative. OSGI service platform[Z].Release 3, 2003.
  • 2Open Services Gateway Initiative [EB/OL]. http://www. osgi.org, 2003.
  • 3Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, Oakland, CA, IEEE Computer Society Press. May 1996. 164-173.
  • 4Blaze M, Feigenbaum J, Ioannidis J et al. The keynote trustmanagement system [EB/OL]. Work in Progress, http://www. cis. upenn. edu/~angelos/keynote. html, June 1998.
  • 5Carl Ellison, Bill Frantz, Butler Lampson et al. SPKI certificate theory[Z]. RFC 2693, IETF, September 1999.
  • 6Chu Y-H, Feigenbaum J, LaMacchia B et al. Referee: trust management for web applications[J]. World Wide Web Journal,2,127-139, 1997.
  • 7Carl Ellison, Bill Frantz, Butler Lampson et al. SPKI certificate theory[S]. RFC 2693, IETF, September 1999.
  • 8Tuomas Aura. Comparison of graph-search algorithms for authorization verification in delegation networks[C]. In: Proceedings of the 2nd Nordic Workshop on Secure Computer Systems (NordSec '97), Espoo, Finland, November 1997.
  • 9Tuomas Aura. Fast access control decisions from delegation certificate databases[C]. In:Colin Boyd and Edward Dawson, editors, Proceedings of the 3rd Australasian conference on information security and privacy (ACISP' 98), Lecture Notes in ComputerScience volume 1438, pages 284-295, Brisbane, Australia, July 1998. Springer.
  • 10Tim Dierks,Christopher Allen. The TLS protocol, version 1.0[S]. RFC 2246, IETF, January 1999.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部