期刊文献+

CA系统脆弱性分析与防范措施

Analysis of CA System Security Vulnerability
下载PDF
导出
摘要 CA作为开放式网络环境下个人身份识别和数据加密传输的基础性设施,正在得到越来越广泛地应用,但许多建设单位只注重CA的性能,对其安全脆弱性则甚少关注。本文根据一个实际的CA系统,介绍了CA系统存在的总体脆弱性和可能存在的内外部攻击方式及防范措施。 CA is widely used as the infrastructure of person identification and encrypt data transform in the open net, but some CA constructer focus on the functions of a CA rather than on the security weakness. This paper based on a concrete CA, introduces the security vulnerability, intrusion from inside and outside, and the measures to protect the system,
出处 《计算机与现代化》 2007年第12期122-124,共3页 Computer and Modernization
关键词 CA 证书 脆弱性 操作安全策略 CA certificate vtdnerability CPS
  • 相关文献

参考文献3

  • 1Bruce Schneier.吴世忠,祝世雄,张文政等译.应用密码学(协议算法与C源程序)[M].北京:机械工业出版社.2000.
  • 2徐良华,史洪,朱鲁华.脆弱性分类技术综述[J].小型微型计算机系统,2006,27(4):627-633. 被引量:3
  • 3Qu G, et al. A framework for network vulnerability analysis [ C ].Proceedings of IASTED International Conference Communications, Internet and Information Technology (CIIT 2002), Virgin Islands,2002:289-298.

二级参考文献15

  • 1Frank Piessens.A taxonomy of causes of software vulnerabilities in internet software[C].Supplementary Proceedings of the 13th International Symposium on Software Reliability Engineering,2002,47-52.
  • 2Landwehr C E,Bull A R,McDermott J P,et al.A taxonomy of computer program security flaws[J].ACM Computing Surveys,September 1994,26(3).
  • 3Aslam T.A taxonomy of security faults in the unix operating system[D].Department of Computer Sciences,Purdue University,1995.
  • 4Matt Bishop.A taxonomy of UNIX system and network vulnerabilities[R].Technical Report 95-10,Department of Computer Science University of California at Davis,CA,May 1995.
  • 5Demillo R A,Mathur A P.A grammar based fault classification scheme and its application to the classification of the errors of TEX[R].Technical Report SERC-TR-165-P,Purdue University,1995.
  • 6Dodson J.Specification and classification of generic security flaws for the tester's assistant library[D].University of California at Davis,1996.
  • 7Ivan Krsul.Computer vulnerability analysis[D].Department of Computer Sciences,Purdue University,1997.
  • 8Cohen F.Information system attacks:a preliminary classification scheme[J].Computers & Security,1997,16(2):94-114.
  • 9Howard J D.An analysis of security incidents on the internet:1989-1995[D].Carnegie Mellon University,1997.
  • 10Ivan Victor Krsul.Software vulnerability analysis[D].Department of Computer Sciences,Purdue University,1998.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部