期刊文献+

一种基于权能标识的三方安全协议的设计和分析 被引量:2

Design and Analysis of a Capability-based Third-Party Security Protocol
下载PDF
导出
摘要 随着数据密集型应用的发展,网络存储的安全性成为研究热点。针对大规模存储系统的可扩展性和安全性的要求,本文提出了一种基于三方传输模式的存储安全系统框架,并设计了一种基于权能标识的三方安全协议,该协议的最大特点是传输安全性和访问控制机制二者独立。通过对三方安全协议的形式化分析和推导,从逻辑上验证请求中权能标识的完整性、协议传输过程的正确性,以及消息的真实性,从而确保了三方安全协议的可行性。 With the growth of data-intensive application, networked storage security becomes hotpot of research. Aiming at the scalability and security requirement of large-scale storage system, a storage security framework basing on third-party transferring mode is proposed, and a capability-based third-party security protocol separating transfer security from access control mechanism is designed. After the formal analysis, it is clear that the deducing results logically validate the integrity of requested capability, correctness of transfers process and authenticity of message, thus guaranteeing the feasibility of the third-party security protocol.
出处 《计算机科学》 CSCD 北大核心 2007年第3期50-53,68,共5页 Computer Science
基金 国家"973"重大基础研究项目(2004CB318203) 国家自然科学基金(60603074)资助
关键词 海量存储系统 权能标识 三方安全协议 形式化分析 Massive storage system, Capability, Third-party security protocol, Formal analysis
  • 相关文献

参考文献10

  • 1Singh A,Voruganti K,Gopisetty S,et al.Security vs Performance:Tradeoffs Using a Trust Framework.In:Proceedings of the 22^nd IEEE/13th NASA Goddard Conference on MSST,2005
  • 2Neumann C,Ts'o T.Kerberos:An Authentication Service for Computer Networks.IEEE Communications Magazine,1994,32(9):33~38
  • 3Blaze M.A Cryptographic File System for UNIX.In:Proc.of 1^st ACM Conference on Communications and Computing Security.USA:ACM Press,1993.9~16
  • 4Gibson G A,Nagle D F,Amiri K,et al.File Server Scaling with Network Attached Secure Disks.In..Proc.of the ACM ICMMCS.USA:ACM Press,1997.272~284
  • 5Kubiatowicz J,Bindel D,Chen Y,et al.Oceanstore:an Architecture for Global-Scale Persistent Storage.In..ASPLOS-1x.USA:ACM Press,1999.190~201
  • 6Butler M L.1 Petabyte Production Storage Environments and File Systems.In:2004 International Conference on Supercomputing.USA:ACM Press,2004
  • 7Dennis J B,Van Horn E C.Programming Semantics for Multiprogrammed Computations.Communications of the ACM,Feb.1966
  • 8卿斯汉.安全协议20年研究进展[J].软件学报,2003,14(10):1740-1752. 被引量:117
  • 9Gong L,Needham R,Yahalom R.Reasoning about belief in cryptographic protocols.In:Proc.of the 1990 IEEE Computer Society Symposium on Research in Security and Privacy.USA:IEEE Press,1990.234~248
  • 10Fabrega F J T,Hertzog J,Guttman J.Strand spaces:Proving security protocols correct.Journal of Computer Security,1999,7(2-3):191~230

二级参考文献6

共引文献116

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部