期刊文献+

基于应用集成的电子政务统一认证系统研究 被引量:2

Research on the Authentication System of Electronic Government Based on the Application Integrated
下载PDF
导出
摘要 电子政务建设需要开发统一的授权管理和用户统一的身份认证系统。通过对用户及权限管理信息的分析,并在讨论身份验证的基础上,利用单点登录来实现统一认证。在系统设计时,对于不同的电子政务网络系统可以采用相应的设计策略,最终可以有效的实现电子政务的统一认证及单点登录。 The electronic government affairs construct need to develop the unified authorized management and the user unification status authentication system. Through to the user and the jurisdiction management information analysis, and in the discussion identification authentication foundation, registers using the single sign - on realizes the unification authentication. When system design, use the corresponding design strategy regarding the different electronic government affairs network system, finally may realize the electronic government unification authentication and single sign - on effectively.
作者 刘明良 涂航
出处 《微计算机应用》 2007年第12期1310-1315,共6页 Microcomputer Applications
关键词 电子政务 应用集成 统一认证 单点登录 electronic government, application integrated, unification authentication, single sign - on
  • 相关文献

参考文献5

二级参考文献25

  • 1[1]Kohl J, C Neuman. The Kerberos Network Authentication Service (V5)[J]. RFC 1510, Digital Equipment Corporation, USC/Information Sciences Institute, September 1993.
  • 2[2]ITU-T, Recommendation X.509. The Directory-authentication Framework[J]. Consultation Committee, International Telephone and Telegraphm, Inernational Telecommunications Union.
  • 3[3]R L Rivest. RFC 1321. The MD5 Message-digest Algorithm[J]. Internet Request for Comments 1321, Apr. 1992.
  • 4[4]C Rigney, A Rubens, W Simpson, S Willens. RFC 2138, Remote Authentication Dial in User Service (RADIUS)[J]. 1997-04-18.
  • 5[1][X509] ITU-T (formerly CCHT) Information technology-Open Systems Interconnection-The Directory: AuthenticationFramework Recommendation X.509[S] ISO/IEC 9594-8.
  • 6[2]Bruce Schneier. Applied Cryptography Protocols. Algorithms and Source Code in C[C]. John Wiley&Sons, Inc., 1994.
  • 7SteveBurnett StephenPaine.密码工程实践指南[M].北京:清华大学出版社,2001.155-156.
  • 8B Aboba,P Calhoun,S Glass et al. Criteria for Evaluating AAA Protocols for Network Access;Internet Engineering Task Force[S].RFC 2989,2000-11.
  • 9AndrewNash WilliamDuane CeliaJoseph.PKI公钥基础设施实现和管理电子安全[M].北京:清华大学出版社,2002.57-121,258-271.
  • 10Andreas Pashalidis ,Chris J Mitchell.A taxonomy of single sign-on systems[C].In:R Safavi-Naini,J Seberry eds.Proceedings of 8th Australasian Conference on the Information Security and Privacy,ACISP 2003 ,Wollongong, Australia,volume 2727 of Lecture Notes in Computer Science ,Springer-Verlag ,Berlin ,2003-07:249~264.

共引文献80

同被引文献12

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部