期刊文献+

基于专网的移动警务安全保障系统设计与研究 被引量:3

Design and research of police mobile security system based on private network
下载PDF
导出
摘要 安全问题是移动IP技术的核心和瓶颈。针对目前公安移动警务系统安全需要,从系统总体目标和安全策略等方面展开研究,提出了一种基于专网的移动警务系统安全接入设计方案。重点对移动公网接入、移动终端认证系统、数据传输安全、安全管理以及与公安内网数据交换的安全策略进行研究和设计。 The security problem is the crux but bottle-neck to the development of mobile IP technology. Considering the needs of police mobile security, from the whole system target and system security tactic, a security access design scheme is proposed for police mobile security system based on private network. Furthermore, it focuses on the research and design ofsome key aspects, suchas: connecting to public mobile network, mobile phone authentication system, data transport security, security management and information exchange security with police information system in inner network.
作者 董煜 林柏钢
出处 《计算机工程与设计》 CSCD 北大核心 2007年第17期4319-4322,共4页 Computer Engineering and Design
关键词 密码管理 安全策略设计 公安虚拟专网 移动IP 移动公网接入 移动终端认证 password management security policy design public security private network mobile IP
  • 相关文献

参考文献8

  • 1孙亮,张来顺,常朝稳.基于STK卡的移动警务安全保障系统研究[J].微计算机信息,2006,22(01X):21-23. 被引量:4
  • 2RFC2003-IP Mobility Support IETF定义的移动IP标准文档[S].
  • 3RFC2411-IP security IETF定义的网络安全标准文档[S].
  • 4Naganand Doraswamy,Dan Harkins.IPSec:The new security standard for Internet[M].京京工作室,译.北京:机械工业出版社,2000.
  • 5Grecas C F,Maniatis S I,Venieris I S.Introduction of the asymmetric cryptography in GSM,GPRS,UMTS,and its public key infrastructure integration[J].Mobile Networks and Applications,2003,8(2):145-150.
  • 6Harn L,Hsin W J.On the security of wireless network access with enhancements[C].Proceedings of the ACM Workshop on Wireless Security,2003:89-95.
  • 7Peirce M,O'Mahony D.Flexible realtime payment methods for mobile communications[J].IEEE Personal Communications,1999,6(6):44-55.
  • 8Ben Galbraith,Whitney Hankison.Professional web service security[M].Wrox Press,2002.

二级参考文献5

  • 1胡河春,胡静涛.交通战备保障预案制定过程决策支持系统研究[J].微计算机信息,2005,21(11S):81-82. 被引量:1
  • 2Ben Galbraith,Whitney Hankison,et al.Professi-onal Web Service Security [M].Wrox Press,2002.
  • 3William Stallings.Cryptography and Network Security Principles and Practice [M].Prentice-Hall,Inc.,1999.
  • 4A K Talukdar, B R Badfinath, A Acharya. MRSVP:A Resource Reservation Protocol for An Integrated Services Network with Mobile Hosts[J].Wireless Networks,2001,7(1).
  • 5[美]HennessyJL PattersonDA.计算机体系结构:量化研究方法(第三版)[M].北京:机械工业出版社,2002..

共引文献3

同被引文献13

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部