期刊文献+

智能调度指挥系统中代理签名方案研究

Study of Proxy Signature Scheme in Intelligent Dispatching System
下载PDF
导出
摘要 设计了一种用于智能调度指挥系统的代理签名和代理多重签名方案,并根据业务的实际流程提出了灵活的代理权收回策略.方案解决了在特殊情况下,任务执行过程中单人和多人授权他人代替自己签名的问题,可以保持工作流执行的连贯性和有效性,满足智能调度指挥系统中代理签名多方面的安全要求. This paper designs a proxy signature and proxy multi-signature scheme for the intelligent dispatching system. It also proposes some policies on the retrieving of the power delegation at any moment. The scheme solves the problem of the signature in the workflow, when someone needs one or more people signed papers on behalf of himself. It shows that the scheme is effective in keeping the continuity of the workflow and the security of the system.
作者 穆海冰 刘云
出处 《北京交通大学学报》 EI CAS CSCD 北大核心 2006年第5期68-71,共4页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家"863"计划项目(2004AA1Z2470) 通信与信息系统北京市重点实验室资助项目(JD100040513)
关键词 信息安全 智能调度指挥系统 代理签名 工作流 information security intelligent dispatching system proxy signature workflow
  • 相关文献

参考文献6

二级参考文献69

  • 1李继国,曹珍富,张亦辰.Improvement of M-U-O and K-P-W proxy signature schemes[J].Journal of Harbin Institute of Technology(New Series),2002,9(2):145-148. 被引量:10
  • 2[1]B Lee,H Kim,K Kim. Strong Proxy Signature and its Applications[C].In:Proc of SCIS 2001,2001:603~608
  • 3[2]B Lee,H Kim, K Kim.Secure Mobile Agent using Strong Non-designated Proxy Signature[C].In:Proc ACIS,2001:474~486
  • 4[3]V Varadharajan,P Allen,S Black. An analysis of the proxy problem in distributed systems[C].In:Proc IEEE Computer Society Symp on Research in Security and Privacy,1991:255~275
  • 5[4]B C Neuman.Proxy-based authorization and accounting for distributed systems[C].In :Proc 13th International Conference on Distributed Computing Systems, 1993:283~291
  • 6[5]M Mambo,K Usuda,E Okamoto. Proxy Signature:Delegation of the Power to Sign Messages[J].IEICE Trans Fundamentals,1996;E79-A:1338~1353
  • 7[6]S Kim,S Park,D Won. Proxy Signature,revisited[C].In:Proc of ICICS′97 International Conference on Information and Communication Security, 1997: 223~232
  • 8[7]D Pointcheval,J Stern.Security proofs for signatures[C].In:Advances in Cryptology: Eurocrypt96, Berlin: springer, 1996: 387~398
  • 9[8]H Petersen,P Horster. Self-certified keys-Concepts and Applications[C].In:Proc Communications and Multimedia Security97,Chapman & Hall,1997:102~116
  • 10[9]H Kim,J Baek,B Lee et al. Computing with secrets for mobile agent using one-time proxy signature[C].In:SCIS′2001,2001:845~850

共引文献74

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部