期刊文献+

身份管理研究综述 被引量:9

Survey of research on identity management
下载PDF
导出
摘要 根据用户管理身份越来越难和身份面临着越来越严重的威胁的实际,为了更有效地管理用户身份信息,形成集身份认证、授权管理、责任认定于一体的基础设施框架,降低管理用户身份、属性、访问权限的成本,增强安全性,保护用户的隐私,方便信息共享,提高生产率。在阐述身份管理基本概念的基础上,主要围绕身份管理系统的体系结构、信任模型、身份认证、隐私保护等关键问题,分析其研究现状,论述已有的研究工作在处理这些问题上的优势和不足,并探讨了未来身份管理的研究方向。 According to the fact that it became more and more difficult for users to manage their own identity and user identity is confronted to more and mare serious threaten. In order to manage the message about user identity more effectively, the infrastructure framework integrating identity authentication, authorization management and responsibility confirm are formed, to reduce the cost of mana- gement of user identity, attributes and access privilege, improve security and protect privacy of users, facilitate share information, promote productivity. The basic concepts of identity management are summarized and its architecture, trust model, identity authentication and privacy protection are mainly discussed. The advantages and disadvantages of the existed technology for solving these problems are analyzed. Some research phases in the future are also discussed.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第6期1365-1370,1375,共7页 Computer Engineering and Design
基金 国家863高技术研究发展计划基金项目(2006AA01Z440、2007AA01Z40)
关键词 身份认证 身份管理 信任管理 身份联盟 体系结构 identity authentication identity management trust management federated identity architecture
  • 相关文献

参考文献35

  • 1Lasance M.Single sign on pipe dream or reality[EB/OL].http:// www.ecominofo.net/art/s/980_ maxware.htm.
  • 2Pfitzmann B,Waidner M.Analysis of liberty single-sign-on with enabled clients[J].IEEE Internet Computing,2003,7(6):38-44.
  • 3Javelin Strategy and Research,Better Business Bureau,Idantity Theft Resource Center, Federal Trade Commission,Gartaer and Privacy and America Business.How many identity theft victims are there? What is the impact on victims? [EB/OL] .http:// www.privacyrights.org/ar/idtheftsurveys.Htm #BBB.
  • 4Spencer C Lee.An introduction to identity management[EB/OL]. http://www.sans.org/reading_room/whitepapers/authentication/852.php.
  • 5Duncan A Buell,Ravi Sandhu.ldentity management[J].IEEE Internet Computing,2003,7(6):26-28.
  • 6Liberty alliance project: Identity-management [EB/OL] .http:// www.proj ectliberty.org.
  • 7倪亮,韩臻,何永忠.身份管理技术综述[J].信息安全与通信保密,2007,29(11):78-81. 被引量:6
  • 8倪亮,韩臻,何永忠.微软新一代身份认证CardSpace技术研究[J].中国科技信息,2007(23):117-117. 被引量:2
  • 9许访,沈昌祥.基于任务的强制访问控制模型[J].计算机应用研究,2004,21(11):70-71. 被引量:7
  • 10盛可军,沈昌祥,刘吉强.基于组织机构的应用区域边界访问控制系统的研究[J].计算机工程与应用,2004,40(25):131-134. 被引量:3

二级参考文献80

  • 1陈泽茂,沈昌祥.基于操作系统安全的计算机病毒防御策略[J].武汉理工大学学报,2004,26(9):75-77. 被引量:4
  • 2邹德清,金海,韩宗芬,涂旭平,李运发.网格信息服务的一致性研究及应用[J].计算机研究与发展,2004,41(12):2108-2113. 被引量:4
  • 3谢俊杰,孟利民.软件无线电的软件下载与安全策略[J].计算机与数字工程,2006,34(5):24-26. 被引量:2
  • 4DAVID F FERRAIOLO,RAVI SANDHU.Proposed NIST Standard for Role-Based Access Control[J].ACM Transcations on informtion and System Security,2001 ;4(3) :224~274
  • 5Ravi S Sandhu,Edward J Conyne.Role-Based Access Control Models[J].IEEE Computer, 1996 ;29(2): 38~48
  • 6ZAHIR TARI,SHUN-WU CHAN.A Role-Based Access Control For Intranet Security[J].IEEE INTRANET COMPUTING, 1997 ;24~25
  • 7DAVID F FERRAIOLO,JOHN F BARKLEY,D RICHARD KUHN.A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet[J].ACM Transactions on Information and System Security, 1999;2(1 )
  • 8SYLVIA OSBORN,RAVI SANDHU,QAMAR MUNAWER.Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies[J].ACM Transactions on Information and System Security,2000;3(2) :85~106
  • 9D Nessett,p Humeen.The multilayer firewall[C].In:Network and Distributed System Security Symposium,1998-03
  • 10Len LaPadula. Secure Computer System:Mathematical Foundations[J].Journal of computer security, 1996;4

共引文献37

同被引文献75

  • 1任金强,刘海龙.桥CA体系中证书策略的设置和处理[J].北京邮电大学学报,2005,28(z1):132-136. 被引量:2
  • 2郭红微,裴树军,陈德运,陈宇.数字签名技术在电子政务系统中的应用与实现[J].哈尔滨理工大学学报,2006,11(1):78-81. 被引量:2
  • 3张苏,李培峰,杨季文,朱巧明.面向Web应用集成的统一授权平台的设计与实现[J].计算机工程与设计,2006,27(8):1369-1371. 被引量:3
  • 4李键,陈杰.RBAC模型权限管理中三种新的角色继承机制和授权策略[J].四川大学学报(自然科学版),2007,44(3):521-524. 被引量:8
  • 5MALER E, REED D. The Venn of identity: options and issues in federated identity management [J].Security & Privacy, 2008, 6(2) : 16-23.
  • 6BERTINO E, LAFAYETTE W, PACI F. Digital identity protection-concepts and issues [ C]//Proceedings of the International Conference on Reliability and Security. Washington: IEEE Computer Society, 2009 : 68-78.
  • 7Gail-Joon Ahn, Moonarn Ko, Mohamed Shehab. Privacy- enhanced user-centric identity management [ C ]//Pro- ceedings of the IEEE international Conference on Commu- nication. Washington: IEEE Computer Society, 2009 : 1-5.
  • 8BHARGAVAN K, FOURNET C, GORDON A D, et al. Verified implementations of the information card federated identity-management protocol [ C ]//Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security. New York: ACM Press ,2008 : 123-135.
  • 9David Recordon, Drummond Reed. OpenlD 2. 0 : a plat- form for user-centric identity management [ C ]//Proceed- ings of the 2nd ACM Workshop on Digital Identity Man- agement ( DIM 06). New York: ACM Press, 2006 : 11 - 16.
  • 10LINDHOLM A. Security evaluation of the OpenlD proto- col [D]. Stockholm, Sweden: KTH Royal Institute of Technology, 2009.

引证文献9

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部