期刊文献+

具有入侵容忍特性的身份认证系统 被引量:3

Authentication System with Intrusion-tolerant Feature
下载PDF
导出
摘要 描述了一个具有入侵容忍特性的分布式身份认证系统,利用多代理和冗余共享验证服务器的设计,使得认证系统具有容忍入侵的能力。将用户密码数据分布存储在多个共享认证服务器中,使得少数服务器受到入侵时仍能继续提供认证服务并且不会暴露用户的密码信息,提高了认证系统的可用性及安全性。 This paper proposes a distributed authentication system with intrusion-tolerant feature. The authentication system is able to tolerate intrusions using the redundant proxy servers and shared authentication servers. With the method of distributing user's key into several shared authentication servers, system continuously provides authentication services and not exposes user's key even under intrusion. Through this scheme, the availability and security of authentication system are enhanced.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第18期157-159,共3页 Computer Engineering
关键词 认证 入侵容忍 秘密共享 代理 Authentication Intrusion-tolerant Secret sharing Proxy
  • 相关文献

参考文献4

  • 1Wu T.A Real-world Analysis of Kerberos Password Security[C].Proc.of Network and Distributed System Security Symposium,San Diego,Calif.,1999.
  • 2Shamir A.How to Share a Secret[J].Communication of ACM,1979,22(11):612-613.
  • 3Courtney T,Lyons J,Ramasamy H V,et al.Providing Intrusion Tolerance with ITUA[C].Proc.of the 2002 International Conference on Dependable Systems and Networks,Piscataway,N J,USA,2002.
  • 4Wang F,Gong F,Jou F,et al.SITAR:A Scalable Intrusion Tolerance Architecture for Distributed Service[C].Proceedings of the 2001IEEE Workshop on Information Assurance and Security,2001-06:38-45.

同被引文献11

  • 1孙玉海,孟丽荣.基于多级入侵容忍的数据库安全解决方案[J].计算机工程与设计,2005,26(3):694-696. 被引量:13
  • 2赵臻,付翔.动态密码身份认证系统[J].湖北成人教育学院学报,2002,8(5):42-42. 被引量:2
  • 3黄建华,宋国新.入侵容忍技术在身份认证系统中的应用[J].华东理工大学学报(自然科学版),2005,31(3):350-353. 被引量:10
  • 4Wang Feiyi, Gong Fengmin, Jou F, etal. A scalable intrusion tolerance architecture for distributed service [C]// Proceedings of the 2001 IEEE Workshop on Information Assurance and Security. New York: United States Military Academy, West Point, 2001 : 38-45.
  • 5Wu Thomas. A real-world analysis of kerberos password security[C]// Proceedings of Network and Distributed System Security Symposium. San Diego, Calif: ISOC, 1999 : 3-5.
  • 6Adi Shamir. How to share a secret[J]. Commun ACM, 1979, 22(11): 612-613.
  • 7Tompa M, Wolt H. How to share a secret with cheater[J]. Journal of Cryptology, 1988, 1: 133-139.
  • 8Gong Fengmin, Goseva-Popstojanova K. Characterizing Intrusion Tolerant Systems Using a State Transition Model[C]//Proc. of DARPA Information Survivability Conference and Exposition. Anaheim, CA, USA: IEEE Press, 2001:211-221.
  • 9Madan B B, Gogeva-Popstojanova K, Vaidyanathan K, et al. A Method for Modeling and Quantifying the Security Attributes of Intrusion Tolerant Systems[J]. Performance Evaluation, 2007, 56(1-4): 167-186.
  • 10Uemura T, Dohi T. Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks via Semi-Markov Cost Models[C]//Proc. of the 2007 Conference on Emerging Direction in Embedded and Ubiquitous Computing. Taipei, Taiwan, China: Springer, 2007: 235-245.

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部