期刊文献+

基于LDAP与Kerberos的认证系统研究与设计——广东非物质文化遗产信息管理系统设计 被引量:2

Research and Design of Authentication System Based on LDAP and Kerberos——Design on Information Administration System of Guangdong Incorporeal Cultural Heritage
原文传递
导出
摘要 为了解决现有非物质文化遗产网络资源分散管理系统各自独立,网络用户信息凌乱并严重重复不能得到有效访问控制等问题。通过对现有网络情况、用户使用需求以及网络服务技术进行分析,设计基于LDAP目录服务与Kerberos认证机制相结合的统一认证系统,提出目录管理与跨域访问认证的模式。集中管理系统资源和用户信息,提高了资源利用率和网络系统资源的安全性。 By analyzing the present use of the Internet, the users' needs and the Internet service technology, the unified authentication system based on the integration of LDAP and Kerberos is designed, and the modes of directory management and cross-realm access authentication are proposed. By centralized administration of system resources and the users' information, the utility of the resources and the security of network system resources are thus enhanced.
作者 黄美东
出处 《通信技术》 2009年第5期197-199,202,共4页 Communications Technology
基金 教育部人文社会科学研究项目(编号:07JA630042)。
关键词 轻量级目录访问协议 KERBEROS 跨域认证 目录服务 访问控制 LDAP Kerberos cross-realm authentication directory service access control
  • 相关文献

参考文献3

二级参考文献17

  • 1Tung B et al.Public Key Cryptography for Cross-Realm Authentication in Kerberos, 2002-05.
  • 2Harbitter A ,Menasce D.Performance of Public-Key-Enabled Kerberos Authentication in LargeNetworks[C].In : 2001 IEEE Symposium on Security and Privacy Proceedings, IEEE Computer Society Press, 2001.
  • 3Sirbu M,Chung-I,Chuang J.Distributed Authentication in Kerberos Using Public Key Cryptography[C].In:Symposium on Network and Distributed System Security, San Diego, California : IEEE Computer Society Press, 1997.
  • 4M Sirbu,J C Chuang.Public key Based Ticket Granting Service in Kerberos.Internet Draft, 1996-05.
  • 5R Lichota,G Hammonds,S Brackin.Verifying Cryptographic Protocols for Electronic Commerce[C] In:2nd USENIX Workshop on Electrnic Commerce, 1996-11.
  • 6Ian Downnard.Public-key crytography extensions into Kerberos.IEEE POTENTIALS, 2003-01.
  • 7B C Neuman,T Ts'o.Kerberos:An Authentication Service for Computer Networks[J],IEEE Communications, 1994;32 (9) : 33-38.
  • 8Tung B et al.Public Key Cryptography for Initial Authenticationin Kerberos, 2002-03.
  • 9Timothy A,Howes Ph D Mark C Smith,et al.Understanding and Deploying LDAP Directory Services, Second Edition[M].USA: Addison-Wesley Pub Co.,2003.1-260.
  • 10Gerald Carter. LDAP System Administration [M].USA: O'Reilly,2003.12-85.

共引文献45

同被引文献14

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部