期刊文献+

基于可信计算的口令管理方案 被引量:4

Password Management Scheme Based on Trusted Computing
下载PDF
导出
摘要 针对现有口令管理方案抗攻击能力和易用性方面的不足.提出了基于可信计算的口令管理方案.该方案借助可信平台模块的密钥管理、安全存储和授权访问控制等关键技术实现了口令管理中敏感数据的安全保护。增强了口令计算过程的安全性.通过与现有方案的对比,分析了该方案的安全性和易用性.结果表明,该方案能提高口令的强度和易用性,并且能够抵抗网络钓鱼攻击. The existed password management methods are not secured enough but inconvenient to change each account password. Based on the key technologies of trusted computing, such as key management, security storage and authorized access control, a new password management scheme is proposed. This scheme helps users manage multiple accounts by turning a single memorized password into a different password for each account. The implementation of the scheme is discussed and compared its strength and usability to those of related approaches. Unlike previous approaches, our scheme is both highly resistant to brute force attacks and convenient to execute a password change for each password. It also can prevent phishing.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第5期93-97,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家"973计划"项目(2007CB310704)
关键词 可信计算 口令鉴别 口令管理 网络钓鱼 trusted computing password authentication password management phishing
  • 相关文献

参考文献13

  • 1Yan J, Blackwell A, Anderson R, et al. The memorability and security of passwords-some empirical results [ Z ]. [S. l. ] : University of Cambridge Computer Laboratory,2000.
  • 2Hamilton S S, Carlisle M C, Hamilton J A. A global look at authentication [C] // IWA' 07. New York: IEEE SMC, 2007: 1-8.
  • 3Gajek S, Sadeghi A R, Stuble C, et al. Compartmented security for browsers-or how to thwat a phisher with trusted computing [ C] // Proceedings of the 2nd International Conference on Availability, Reliability and Security. Washington D C: IEEE Computer Society, 2007: 120-127.
  • 4Me G, Pirro D, Sarrecchia R. A mobile based approach to strong authentication on web[ C] // Proceedings of the International Multi-Conference on Computing in the Global Information Technology. Washington D C: IEEE Computer Society, 2006: 67-67.
  • 5Schneier B. Password safe [ EB/OL ]. [ 2008-02-17 ]. http://www, counterpane, com/passsafe, html.
  • 6Gabber E, Gibbons P B, Matias Y, et al. How to make personalized web browsing simple, secure and anonymous [C] // Proceedings of Financial Cryptography' 97. Anguilla: Springer-Verlag, 1997: 17-31.
  • 7Ross B, Jackson C, Miyake N, et al. Stronger password authentication using browser extensions[C]//Proceedings of the 14th USENIX Security Symposium. California: USENIX Association Berkeley, 2005: 17-32.
  • 8Halderman J A, Waters B, Felten E W. A convenient method for securely managing passwords [ C ]//Proceedings of the 14th International Conference on World Wide Web. Chiba: ACM Press, 2005:471-479.
  • 9Yee K P, Sitaker K. Passpet: convenient password management and phishing protection[C]//Proceedings of the Second Symposium on Usable Privacy and Security. New York: ACM, 2006: 32-43.
  • 10Trusted Computing Group. TCG specification architecture overview specification [ EB/OL ]. [ 2007-08-02 ]. http://www, trustedcomputinggroup, org.

同被引文献31

  • 1章勤,陈春润,羌卫中,刘英书.基于网格环境的可信计算平台共享模型[J].华中科技大学学报(自然科学版),2007,35(12):5-8. 被引量:5
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3郑宇,何大可,梅其祥.支持可信计算的软件保护模型[J].西南交通大学学报,2006,41(1):63-67. 被引量:7
  • 4GUAN S Y,DONG X S,WU W G,et al.Trust management and service selection in pervasive computing environments[C] // Proceedings of International Conference on Computational Intelligence and Security Workshops.Washington,DC:IEEE,2007:620 -623.
  • 5TCG.TPM Specification Version 1.1[EB/OL].[2009-06-20].http://www.trustedcomputinggroup.org.
  • 6BRICKELL E,CAMENISCH J,CHEN L Q.Direct anonymous attestation[C] // Proceedings of ACM Conference on Computer and Communications Security.New York:ACM,2004:132 -145.
  • 7TCG.TCG Specification Architecture Overview.Vereionl.4[EB/OL].[2009-08-02].http://www.trustedcomputinggroup.org/.
  • 8BRIZEK J,KHAN M,SEIFERT J P,et al.A platform-level trust architecture for hand-held devices[C] // Proceedings of 2005 Workshop on Cryptographic Advances in Secure Hardware.New York:ACM,2005.
  • 9EISENBARTH T,G(U)EYSU T,PAAR C,et al.Reconfigurable trusted computing in hardware[C] // Proceedings of the 2007 ACM workshop on Scalable trusted computing.New York:ACM,2007:15-20.
  • 10DIETRICH K.An integrated architecture for trusted computing for Java enabled embedded devices[C] // Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing.New York:ACM,2007:2-6.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部