期刊文献+

一个基于组件的CA认证中心的设计

A COMPONENT-BASED GENERAL DESIGN OF CA
下载PDF
导出
摘要 CA 认证是保证网络数据安全传输的有效的技术手段,如何建设一个灵活的、便于维护和升级的 CA 认证中心系统更是意义重大.本文提出了一种基于组件技术的分层的 CA 认证中心结构.该系统结构灵活,易于扩展,并采用 UML 作为设计工具. Certificate authority is an efficient technique to ensure safe transmission over insecure network channels.It's of vital importance to build a certificate authority center that is flexible and easy to be maintained and upgraded. This paper presents a layered and component - based architecture of CA. The system which is designed by UML is flexible and easy to be expanded.
机构地区 哈尔滨师范大学
出处 《哈尔滨师范大学自然科学学报》 CAS 2005年第6期40-42,共3页 Natural Science Journal of Harbin Normal University
基金 黑龙江省教育厅资助项目
关键词 组件 CA UML Component CA UML
  • 相关文献

参考文献8

  • 1孔雷,赵锦蓉.网络安全与代理技术[J].计算机工程与应用,2001,37(14):58-61. 被引量:9
  • 2Munindar P.Singh.An Evolutionary Look at E - Commerce.[J].IEEE Internet Computing.2001,(3):6 ~10.
  • 3Gritzalis,Stefanos; Katsikas,Sokratis K.,Lekkas,Dimitrios,Moulinos,Konstantinos,Polydorou,Eleni.Securing the Electronic Market:The KEYSTONE Public Key Infrastructure.Architecture[J].Computers and Security.2000,(12):731 ~746.
  • 4Bruno,Lee.Certificate authorities:Who do you trust? [J].Data Communications.1998,(3):54 ~63.
  • 5Perlman,Radia.Overview of PKI Trust Models.[J].IEEE Network 1999,(6):38 ~43.
  • 6GradyBooch JamesRumbaugh IvarJacobson.UML用户指南[M].北京:机械工业出版社,2001..
  • 7王育民 刘建伟.通信网的安全-理论与技术[J].西安电子科技大学出版社,2000.138-152.
  • 8HafedhMili AliMili SherifYacoub EdwardAddy.基于重用的软件工程-技术、组织和控制[M].电子工业出版社,2003.4.529-545.

二级参考文献8

  • 1[1]B Harris,R Hunt. TCP/IP Security threats and attack methods[J].Computer communications, 1999;22:885-897
  • 2[2]ITU-T Recommendation X.509.The Directory-Authentication Framework, 1997.6
  • 3[3]J Kohl ,B Neuman.The Kerberos Network Authentication Service(V5)[S].RFC1510,1993.9
  • 4[4]S Kent,R Atkinson. Security Architecture for the Internet Protocol[S].RFC2401,1998.11
  • 5[5]A Frier,P Karlton,P Kocher. The SSL 3.0 Protocol[M].Netscape Communications Corp., 1996.11
  • 6[6]B C Soh,S Yong. Network system and world wide web security[J].Computer communications, 1998;20:1431-1436
  • 7[7]Paul Wing,Brian O'Higgins. Using Public-Key Infrastructures for Security and Risk Management[J].IEEE Communications Magazine, 1999.9
  • 8[8]Ray Hunt.Intemet/Intranet firewall security-policy,architecture and transaction services[J].Computer communications, 1998;21:1107-1123

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部