期刊文献+

网格环境中认证模型的研究 被引量:1

Research of Authentication Model in Grid Environment
下载PDF
导出
摘要 针对目前PKI系统建设和维护成本过高,对网格规模有一定限制的问题。研究了公钥基础设施PKI的体系结构,以及基于身份的PKI(ID-PKI)的认证框架,并分析了两种设施的优缺点。提出了一个PKI和ID-PKI相结合的网格认证框架,并对其结构、工作思想作了描述,进一步分析了它的安全性和效率。该认证框架比传统的基于X.509证书的PKI认证系统结构简单、灵活,因而较大地提高了认证效率,降低了系统成本,其安全性也是可以保证的。 In view of the excessive cost that public key infrastructure system's construction and maintenance has limited the scale of the grid. The paper has studied the architecture of the public key infrastructure, as well as the authentication architecture of the identity-based PKI, and has analyzed the good and bad points of two kind of infrastructure. It proposed a grid authentication schemewhich unify the PKI and ID-PKI, and has described its structure and the work thought, further has analyzed its security and the efficiency. This authentication architecture is simpler and more nimble than the traditional PKI system structure based on X. 509 certificate, thus it enhances the authentication efficiency, and reduces the cost of system, and its security also was guaranteed.
作者 鲍美英 马礼
机构地区 中北大学
出处 《电脑开发与应用》 2007年第11期10-12,15,共4页 Computer Development & Applications
基金 山西省高校科技研究开发项目(200611028)
关键词 公钥基础设施 基于身份的公钥基础设施 网格安全认证 框架 public key infrastructure,identity-based PKI,grid security authentication,architecture
  • 相关文献

参考文献7

  • 1Butler R,Welch V,Engert D et al.A national-scale Authentication Infrastructure[J].IEEE Computer,2000,33(12):60-66.
  • 2Shamir A.Identity-based Cryptosystems and signature Schemes[A]//Proceedings of CRYPTO' 84[C].Berlin:Springer-Verlag,1985:47-53.
  • 3Boneh D,Franklin M K.Identity-based Encryption from the Weil Pairing[A]//Proceedings of Crypto' 01[C].Berlin:Springer-Verlag,2001:213-229.
  • 4王荣斌,陈蜀宇,姬晓波,喻林.一种基于身份网格认证框架的零知识改进方案[J].华中科技大学学报(自然科学版),2006,34(z1):167-170. 被引量:3
  • 5Foster I,Kesselman C.A Security Architecture for Computational GRID[A].In Proceedings of the 5th ACM Conference on Computer and Communications Security[C].New York:ACM press,1998.
  • 6Thompson M,Essiari A,Mudumbai S.Certificatebased Authorization Policy in a PKI Environment[J].ACM Tranaactions on Information and System Security,2003,6(4):566-588.
  • 7Nagaratnam N,Janson P,Dayka J,et al.The Security Architecture for Open GRID Services[OL].http://www.cs.virginia.edu/- humphrey/ogsa-sec-wg/OGSA-SecArch-v1-07 192002.pdf.J,2002-07-10.

二级参考文献5

  • 1[3]Shamir A.Identity-based cryptosystems and signature schemes[C]∥Proceedings of CRYPTO'84.Berlin:Springer-Verlag,1985:47-53.
  • 2[4]Boneh D,Franklin M K.Identity-based encryption from the weil pairing[C]∥Proceedings of Crypto'01.Berlin:Springer-Verlag,2001:213-229.
  • 3[5]Huang X,Chen L,Huang L,et al.An identity-based grid security infrastructure model[C]∥Proceedings of the 1st International Conference on Information Security Practice and Experience (ISPEC 2005).Berlin:Springer-Verlag,2005:314-325.
  • 4[6]Lee B,Boyd C.Secure key isuuing in ID-based cryptography[J].Communications of the ACM,2004,22:1 979-1 984.
  • 5[7]Feige U,Lapidot,Shamir A.Multiple non-interactive zero knowledge proofs based on a single random string[J].Foundations of Computer Science,1990,1(1):308-317.

共引文献2

同被引文献21

  • 1杨涛,刘锦德.Web Services技术综述——一种面向服务的分布式计算模式[J].计算机应用,2004,24(8):1-4. 被引量:94
  • 2许峰,林果园,黄皓.Web Services的访问控制研究综述[J].计算机科学,2005,32(2):1-4. 被引量:15
  • 3彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 4Jothy Rosenberg,David L.Remy.Securing Web Services with WS-Security[M].Sams Publish May 12 2004.408.
  • 5Dirk Krafzig,Karl Banke,Dirk Slama.Enterprise SOA.Service-Oriented Architecture Best Practice[M].Prentice Hall,Nov.9 2004.408.
  • 6Mark O'Neill et al.Web Services Security[M].McGraw-Hill/Osborne 2003.312.
  • 7Bret Hartman,Donald J Flinn,Konstantin Beznosov,Shirley Kawamoto.Master Web Services[M].Security Wiley Publishing,Inc.,2003.
  • 8Adi Shamlr.Identity based cryptosystems and signature schemes[C].In G.BIakley and David Chaum,editors,Proceedings of Crypto 1984,volume 196 of LNCS.Springer-Verlag,1984.47-53.
  • 9Dan Boneh,Matt Franklin.Identity-based encryption from the Well pairing[C].Joe Kilian,editor,Proceedings of Crypto 2001,LNCS Springer-Verlag,2001,2139:213-229.
  • 10Dan Boneh,Xavier Boyen,Eu-Jin Goh.Hierarchical identity based encryption with constant size ciphertext[C].Advances in Cryptology Eurocrypt 2005 Springer-Verlag,2005,LNCS,2005,3494:440-456.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部