期刊文献+

基于PKI的网络信息安全模型的研究与设计 被引量:13

Study and design of network information secure model based on PKI technology
下载PDF
导出
摘要 Internet/Intranet的引入为企业实现信息化,提供了一个快捷、高效、方便的网络环境,但网络信息安全问题越来越突出。PKI为基于网络的安全应用提供了一个真正可靠、稳定、安全的平台。通过对当前网络存在的安全性问题分析,首先探讨PKI/CA的体系结构并对其进行了改进,提出了一种基于PKI的可靠的网络信息安全模型,并按照此模型架构企业的PKI应用体系,并结合企业网上电子商务实例进行分析和讨论。 The Internet/Intranet emergence provided for the business enterprise a fast, efficiently, convenient network environment. But the security problem of network information system is more and more outstanding. PKI provide a real credible, steady, secure platform for secrecy application based on network. Firstly, the security problem of network and the architecture of PKI/CA system are discussed. The further improvement is made. A network information secure model based on PKI technology is designed and the safe system on network according to this model is set up. Finally, a practical instance ore-commerce is analyzed in detail.
出处 《计算机工程与设计》 CSCD 北大核心 2007年第2期349-350,394,共3页 Computer Engineering and Design
关键词 网络 公钥基础设施 安全模型 认证中心 数字证书 network public key infrastructure secure model certificate authority digital certificate
  • 相关文献

参考文献7

  • 1田启明 卢劲松.PKI技术分析与应用[J].计算机应用与研究,2004,(7):79-80.
  • 2徐志大,南相浩.认证中心CA理论与开发技术[J].计算机工程与应用,2000,36(9):87-90. 被引量:20
  • 3Garlisle Adams Steve.公开密钥基础设施-概念、标准和实施[M].北京:邮电出版社,2001.192-199.
  • 4Myers M,Xliu,Schaad J,et al.Certificate management messages over CMS[S].RFC2587,2000.
  • 5Lidong Zhou,Fred B Schneider,Robbert van Renesse.COCA:A secure distributed on_line certification authority[J].ACM Trans on Computer Systems,2002,(20):329-368.
  • 6Donnelly M.An introduction to LDAP[R].2000.http://www.ld-a pman.net/articles/index.html.
  • 7Good G.The LDAP data interchange format(LD IF)-technical specification[S].RFC2849,2000.http://www.ietf.org/rfc/rfc2849.txt.

二级参考文献12

  • 1[1]ISO/IEC 9594-8/ITU-T Recommendation X.509.Information Tech-nology-Open Systems Interconneetion-The Directory:Authentication Framework.ITU,1997
  • 2[2]W Yeong,T Howes,S Kille.Lightweight Directory Access Protocol. RFC 1777,1995.3
  • 3[3]M Wahl,T Howes,S Kille.Lightweight Directory Access Protocol. RFC 2251,1997.12
  • 4[4]S Kent.Privacy Enhancement for Internet Electronic Mail:Part 2: Certificate_Based Key Management.RFC 1422,1993.2
  • 5[5]Internet Public Key Infrastructure-X.509 Certificate and CRL Profile.Section 6:PKIX Working Group Internet Draft
  • 6[6]M Myers,R Ankey,A Malpani,et al.X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP.IETF X.509 PKIX Working Group,1998.9(draft)
  • 7[7]R Housley,W Ford,W Polk,et al.Internet X.509 Public Key Infrastrocture Certificate and CRL Profile.RFC 2459,1999.1
  • 8[8]S Boeyen,T Hocws,P Richard.Internet X.509 Public Key Infrastructure LDAPV2 Schema.RFC 2587,1999.6
  • 9[9]C Adams,S Farrell.Internet X.509 Public Key Infrastructure Certificate Management Protocols.RFC 2510,1999.3
  • 10[10]R Housley.Internet X.509 Public Key Infrastructure Operational Protocols:FTP and HTTP.RFC 2585,1999.5

共引文献23

同被引文献80

引证文献13

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部