期刊文献+

采用层次结构的认证中心实现跨校统一身份认证 被引量:1

Realization of roaming identity authentication infrastructure based on hierarchical certification center
下载PDF
导出
摘要 随着高校信息化的逐步推进,各学校已基本实现了无线网络覆盖,介绍了一种无线网络的认证中心的建设方案,构建多层次结构的认证中心,以实现无线跨校漫游统一身份认证。最后,对此漫游认证机制进行安全评价并给出一种保障登录及数据传输安全的措施。 With the development of network construction, schools have built their campus wireless network. This paper brings out the way to establish a certificating center which can be used to authentication users through wireless PAP, and based on the center, we can set up hierarchical certificating centers to fulFdl roaming authentication. At last an analysis is concluded about Roaming Identity Authentication Infrastructure and measures are given out to protect logging on and data transmission secttrity.
作者 常潘 沈富可
出处 《计算机应用》 CSCD 北大核心 2009年第B06期36-37,62,共3页 journal of Computer Applications
关键词 认证中心 漫游 身份认证 certificating center roam identity authentication
  • 相关文献

参考文献3

  • 1Eduroam.Educational Roaming Infrastructure. http://www.eduroam.org . 2006
  • 2.WLAN Security Enhancements[].IEEEi.2004
  • 3IEEE802.1x Port-Based Network Access Control. http://standards.ieee.org/get-ieee802/download/802.1X-2004.pdf . 2004

同被引文献8

  • 1TIAN Fu L, TZONELIH H. Provably secure and efficient authentication techniques for the global mobility nctwork [ J ]. The Journal of Systems and Software,2011,84 (10) : 1717-1725.
  • 2DAOJING H,JIAJUN B,SAMMY C,et al. Privacy-Preser- ving Universal Authentication Protocol for Wireless Com- munications[ J]. IEEE Transactions on Wireless Commu- nications, 2011,10 ( 2 ) :431-436.
  • 3JIN Jo H, HA Paik J, DONG Hoon L. Efficient Privacy- Preserving Authentication in Wireless Mobile Networks [ J ]. IEEE Transactions on Mobile Computing, 2014, 13 (7) :1469-1481.
  • 4SAHAI Amit, WATERS Brent. Fuzzy identity-based en- cryption [ M ]. USA : Springer Berlin Heidelberg, 2005 : 457-473.
  • 5GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[ C]//ACM. Proceedings of the 13th ACM confer- ence on Computer and communications security. Alexan- dria, USA : ACM, 2006 : 89-98.
  • 6YU S, WANG C, REN K, LOU W. Achieving Secure, Scalable ,and Fine-grained Data Access Control in Cloud Computing [ C ]//IEEE. INFOCOM 2010 Proceedings IEEE. San Diego, USA : INFOCOM ,2010 : 1-9.
  • 7ERBER R, SCHLAGER C, PERNUL G. Patterns for Au- thentication and Authorisation Infrastructures [ C ]// IEEE. Database and Expert Systems Applications, 2007.DEXA 18th International Workshop on. Regensburg, Ger- many:IEEE Conference Publications,2007:755-759.
  • 8张赫,张增修,王迎霞,刘莉,沈富可.基于跨校身份认证技术共享数字化教学资源[J].远程教育杂志,2011,29(6):18-23. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部