期刊文献+

点对点网络安全机制的研究 被引量:2

The Research on The Peer-To-Peer security model
下载PDF
导出
摘要 P2P技术具有分布式的特性并且能够充分利用网络资源,这使得它在文件共享应用中能够发挥巨大作用。但是,由于P2P网络缺乏集中控制,使得P2P网络的安全成为一个突出的问题。该文总结了P2P应用的安全需求,并提出一个分布式信任关系。 Because of its distributed characteristic and making resources being more fully utilized, Peer-to-Peer technology can be used to improve the file sharing application. However, P2P network is short of centralized control so that the security in P2P network is faced with much challenge. This paper analyzes the security requirements and give a distributed trust relationship
出处 《计算机安全》 2007年第10期31-33,共3页 Network & Computer Security
基金 西安市科技攻关项目GG05019
关键词 P2P 安全性分析 信任关系 P2P analyzes the security requirements trust relationship
  • 相关文献

参考文献9

二级参考文献36

  • 1叶润国,宋成,吴迪,李文印,陈震.P2P网络中对等节点间安全通信研究[J].微电子学与计算机,2004,21(6):95-99. 被引量:14
  • 2郭正荣,周城.SSL协议工作过程及其应用[J].网络安全技术与应用,2004(10):55-57. 被引量:6
  • 3.JXTA And Security.http:∥deve1oper. java. sun. con/deve1oper/Books,.
  • 4W E Burr.Public Key Infrastructure(PKI)Technical Specifications: Part A-Technical Concept of Operations.Working Draft, http ://csrc. nist.gov/pki/twg/baseline/pkicon20b.PDF , 1998.
  • 5John Linn.Tmst Model and Management in Public-Key Infrastructures[R].Technical Report, ftp ://ftp.rsasecurity.com/pub/pdfs/PKIPa-per.pdf, 2000.
  • 6Steven Lloyd.PKI Interoperability Framework.Whiter Paper, http :// www.pkiforum.org/pdfs/PKIInteroperabilityFramework.pdf, 2001.
  • 7Capt James M Hayes.The Problem with Multiple Roots in Web Browsers-Certificate Masquerading[C].In:Enabling Technologies:Infrastructure for Collaborative Enterprises, (WET ICE'98)Proceedings, Seventh IEEE International Workshops on, 1998:306-311.
  • 8Steve Lloyd.CA-CA Interoperability.White Paper,http://www.pkiforum.org/pdfs/ca-ca_interop.pdf, 2001.
  • 9Andrew Young,Nada Kapidzic Cicovic,David Chadwick.Trust Models in ICE-TEL[C].In :Network and Distributed System Security,Proceedings, 1997:122-133.
  • 10Gatekeeper:A strategy for public key technology use in the Government.Australian Office of Government Information Technology,http:// www.govonline.gov.au/publications/GatekeeperStrategy.pdf, 1998.

共引文献67

同被引文献2

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部