期刊文献+

基于可信计算平台的身份管理框架 被引量:2

Identity management framework based on trusted computing platform
下载PDF
导出
摘要 针对网络用户身份管理难题及现有的身份管理方案存在的不足,基于可信计算平台完整性校验、保护存储和访问控制以及远程平台校验等安全特性,提出了可信计算平台身份管理方案和协议。本方案实现了多种方式的身份认证及身份、身份认证审计记录和主密钥、审计密钥、平台AIK私钥的加密存储,以及移动平台的可信验证、加密身份的还原和服务提供者身份标志的查找定位,并实现了身份信息和认证数据的加密传输。最后,进行了安全性分析,结果表明该方案在保护用户身份信息安全的前提下,大大减轻了用户身份管理的负担。 According to the fact that it' s becoming more and more difficult for network users to manage their identity and there were some faults in current identity management scheme. Based on the security characteristics such as integrity verifica- tion, protect storage, access control and remote platform check, the paper put forward identity management scheme and proto- col that rely on U-Key. The scheme realized multimode identity authentication and encryption storage for identity, audit record about identity authentication, master keys, audit key, trusted verification for trusted computing platform, restored from en- crypted identity, searched position of service providers identity and encrypted transmission of identity information and authenti- cation information. In the end, security analysis have been done, the result indicated that the scheme lighten the user's bur- den for their own identity management greatly under the circumstance that protect information security of user identity.
出处 《计算机应用研究》 CSCD 北大核心 2009年第9期3493-3495,3498,共4页 Application Research of Computers
基金 国家“973”基础研究规划资助项目(TG1999035801)
关键词 可信计算平台 身份管理 完整性校验 平台校验 trusted computing platform identity management integrity verification platform checking
  • 相关文献

参考文献9

  • 1PFITZMANN B, WAIDNER M. Analysis of liberty single-sign-on with enabled clients[J]. IEEE Internet Computing, 2003, 7(6) : 38-44.
  • 2DUNCAN A, SANDHU R. Identity management[ J]. IEEE Internet Computing, 2003, 7(6) :26-28.
  • 3JOSANG A, POPE S. User centric identity management [ EB/OL]. (2005) [2008-01-21 ]. http://sky, fit. qut. edu. art/- josang/pa- pers/JP20OS-AusCERT, pdf.
  • 4MANNAN M, Van OORSCHOT P C. Using a personal device to strengthen password authentication from an untrusted computer [ EB/ OL]. (2007-03-30) [2008-01-21]. http://www, ecsl. carleton, ca/ paperarchive/mpauth, pdf.
  • 5DAMIANI E, De VIMERCATI S C, SAMAEARI P. Managing multiple and dependable identities [ J ]. IEEE Interact Computing, 2003,7(6) :29-37.
  • 6NTT DoCoMo, IBM, Intel Corporation. Trusted mobile platform hardware architecture description [ EB/OL ]. http://www, trusted-mobile. org/TMP_HWAD_revI_00, pdf.
  • 7国家密码管理局.可信计算密码支撑平台功能与接口规范[EB/OL].http://www.oscca.Gov.on/UpFile/File64.PDF,2008
  • 8王育民,刘建伟.通信网的安全——理论与技术[M].西安:西安电子科技大学出版社,2002.
  • 9李建,刘吉强,周正,沈昌祥,张俊.可信移动平台软件安全载入策略模型研究[J].计算机工程,2009,35(2):148-150. 被引量:7

二级参考文献7

  • 1陈泽茂,沈昌祥.基于操作系统安全的计算机病毒防御策略[J].武汉理工大学学报,2004,26(9):75-77. 被引量:4
  • 2谢俊杰,孟利民.软件无线电的软件下载与安全策略[J].计算机与数字工程,2006,34(5):24-26. 被引量:2
  • 3Pisko E, Rannenberg K, Roβnagel H. Trusted Computing in Mobile Platforms Players, Usage Scenarios, and Interests[J]. Datenschutz and Datensicherheit, 2005, 9(29): 526-530.
  • 4Cook P G. Wireless Software Download Security[EB/OL]. (2006-06-14). http://www.sdfforum.org/uploads/pub_17683004_i_0069_v0_00_ wireless_securit y_06_14 04.pdf.
  • 5Gehrmann C, Stahl E Mobile Platform Security[EB/OL]. (2006-02-16). http://www.eric s son.com/ericsson/corpinfo/publicationns/review/2006_ 02/03.sbtml.
  • 6Hoffmeyer J, Park I, Majmundar M. Radio Software Download for Commercial Wireless Reconfigurable Devices[J]. IEEE Radio Communications, 2004, 42(3): 26-32.
  • 7Aissi S, Maruyama H, Miura E et al Trusted Mobile Platform Protocol Specification Document[EB/OL]. (2004-04-05). http:// www.trusted-mobile.org/TMP Protocol_rev 1 _00.pdf.

共引文献15

同被引文献19

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部