期刊文献+

双因素身份认证令牌验证的SSL VPN应用网关研究与设计 被引量:1

Research and Design of Token Proven SSL VPN Application Gateway Base on Two-factor Authentication
下载PDF
导出
摘要 目前SSL VPN通常采用的公开算法,其安全性正在受到学者的质疑.入侵者若窃听到户名/口令,即可得到合法访问权限,并可通过合法权限非法访问内部系统.在现有的SSL VPN方案基础上,本文对实际应用中的各种可能服务类型进行分析,提出了一类使用iKey+PIN码双因素进行验征的解决方案,利用全新的权限验证方法结合SSL VPN技术解决内部系统访问的安全问题,并给出了这一方法的方案设计.这一方案可解决由访问权限引起的内部系统访问的安全问题. The safety of existing SSL VPN open algorithm is being questioned by scholars. If the intruders get the Username / password by eavesdroping, access can be legal, and leading to unauthorized access internal systems by lawful authority. Refering to the existing programmes of SSL VPN., in this paper, the practical applications of the various types of service are carried out analysis, and the use of a class of iKey + PIN code for two-factor authentication solutions is proposed, by using a new method of certification authority combining SSL VPN technology to solve internal system access security issues. And this approach has given the programme design. The programme can resolve the access security issues of the internal system.
出处 《湘南学院学报》 2008年第5期75-78,82,共5页 Journal of Xiangnan University
关键词 SSL VPN IKEY PIN码 应用程序代理服务器 VPX SSL VPN iKey PIN application proxy server VPX
  • 相关文献

参考文献2

二级参考文献18

  • 1刘敬轩,戴英侠.基于SSL的VPN网关的设计与实现[J].计算机应用,2005,25(B12):140-142. 被引量:10
  • 2STINSON DR.密码学原理与实践[M].冯登国,译.北京:电子工业出版社,2003.
  • 3RESCORLA E.SSL and TLS:Designing and Building Secure Systems[M].1 st edition.Addison-Wesley Professional,2000.
  • 4DAVIS CR,DAVIS C.IPSec:Securing VPNs[M].Osborne/McGrawHill,2001.
  • 5VIEGA J,MESSIER M,P CHANDRA.Network Security with OpenSSL[M].1st edition.O'Reilly Media,Inc,2002.
  • 6Wolf R, Keinz T, Schneider M. A model for content-dependent access control for Web-based services with role-based approach.Database and Expert Systems Applications,2003. 209-214
  • 7Spencer R,Smalley S, Loscocco P, et al. The Flask Security Architecture:System Support for Diverse Security Policies. In: Proceedings of the Eighth Security Symposium, August 1999. 123-139
  • 8Bertino E, Catania B, Ferrari E, et al. A System to Specify and Manage Multipolicy Access Control Models. Policies for Distributed Systems and Networks, 2002. 116-127
  • 9Jason J,Rafalow L, Vyncke E. IPSec Configuration Policy Information Model. RFC3585, August 2003
  • 10Guo Xin,Yang Kun,Galis A, et al. A Policy-based Network Management System for IP VPN. Communication Technology Proceedings, 2003. ICCT 2003,2:1630-1633

共引文献23

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部