期刊文献+

基于可信移动平台的跨身份标志域访问模型 被引量:6

Access model spanning identifier domain based on trusted mobile platform
下载PDF
导出
摘要 重点研究了不同身份标志域中用户与服务提供者之间的信任关系建立问题,提出了基于可信移动平台的移动身份管理框架。将可信移动平台提供的可信引导、远程平台证明和可信票据机制集成到框架中以建立不同身份标志域间的信任关系。由于移动平台的计算和存储能力有限,该框架协议呈现了服务器完成了大部分计算的不平衡特征。该框架以用户为中心并抵抗各种攻击,增强了安全性能。 This paper focused on building trust relationship between users and service providers in different domains. Proposed a framework for mobile identity management based on the trusted mobile platform. Integrated the mechanisms of trusted booting and remote platform attestation provided by trusted mobile platform into the framework to build the trust relationship among different identifier domains. Since the limited computing and storage capacity of the mobile platform, the protocol in this frame- work is characteristic of unbalance with the servers doing most of the computations. This framework is nser-centrie with enhanced security against various attacks.
出处 《计算机应用研究》 CSCD 北大核心 2009年第1期321-324,共4页 Application Research of Computers
基金 国家“863”计划资助项目(2006AA01Z440,2007AA01Z40)
关键词 身份管理 身份标志域 可信移动平台 信任关系 identity management identifier domain trusted mobile platform trust relationship
  • 相关文献

参考文献11

  • 1BUELL D A, SANDHU R. Identity management [ J]. IEEE Internet Computing, 2003,7 ( 6 ) : 26 - 28.
  • 2JOSANG A, FABRE J, HAY B, et al. Trust requirements in identity management[ C ]//Proc of ACM International Conference Proceeding Series Proceedings of the 2005 Australasian Workshop on Grid Computing and E-research Newcastle, New South Wales : [ s. n. ] ,2005 : 99-108.
  • 3National e-health transition authority. Identity Management Glossary of Terms[ EB/OL]. (2007-08-09) [2008 -02-21 ]. http://www. nehta. gov. au/index. php? option = com_docman&task = cat_view&gid = 152&Itemid = 139.
  • 4SAMPATH R,GOEL D. RATING:rigorous assessment of trust in identity management[ C ]//Proc of the 1 st IEEE Computer Society, International Conference on Availability, Reliability and Security( ARES' 06). 2006 : 14-23.
  • 5ABE P, ITOH H, TAKAHASHI K. Implementing identity provider on mobile phone [ C ]//Proc of ACM Workshop on Digital Identity Management. 2007:46 - 52.
  • 6BARBARA FICHTINGER, BSC. Trusted infrastructure for identity [ EB/OL ]. http ://andreas. schmidt. novalyst. de/docs/Fchtinger_ Trusted_infrastructure_for_Identities. pdf.
  • 7AISSI S, MARUYAMA H. Trusted mobile platform protocol specification document[ EB/OL ]. http ://www. trusted-mobile. org/TMP_Protocol_rev1_00. pdf.
  • 8NTT DoCoMo, IBM, Intel Corporation. Trusted mobile platform hardware architecture description [ EB/OL]. http ://www. trusted-mobile. org/TMP_Protocol_rev1_00. pdf.
  • 9国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].http://www.oscca.Gov.on/UpFile/File64.PDF,2008
  • 10KUNTZE N, SCHMIDT A U. Trusted computing in mobile action [ J]. ACM CLASSIFICATION C. 2. 0 [ Computer- Communication Networks ] :General -security and protection.

共引文献14

同被引文献77

引证文献6

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部