期刊文献+

基于PMI的Web安全访问控制系统设计 被引量:8

Design of Security Access Control System of the Web Based on PMI
下载PDF
导出
摘要 针对Web资源得安全控制问题,设计了一个基于授权管理基础设施PMI技术的安全访问控制系统。系统依据匿名证书对用户进行身份认证,使用属性证书为用户授予角色,通过角色访问策略控制对Web资源的访问。该系统对Web资源的安全访问控制提供了一种有效的解决方案。 In order to solve the security control problems of the Web resource,a PMI-based security access control system is designed. In this system, authentication is accomplished by pseudonymous certificate of the user, attribute certificate is used for granting a role to user and role policy is applied for accessing control the Web resource. An effective solution of se curity access control for the Web resource is provided in this system.
作者 张星 严承华
机构地区 海军工程大学
出处 《舰船电子工程》 2009年第8期155-157,169,共4页 Ship Electronic Engineering
关键词 授权管理基础设施 匿名证书 访问控制 Privilege Management Infrastructure(PMI), pseudonymous certificate, access control
  • 相关文献

参考文献4

二级参考文献14

  • 1洪京民,班晓娟,曾广平,涂序彦.安全认证技术在“软件人”系统中的应用[J].微计算机信息,2005,21(07X):72-74. 被引量:3
  • 2谭寒生 张舰 等.PMI与PKI模型关系研究[J].计算机应用,2002,(8):86-88.
  • 3Menczer F,Pant G,Ruiz M et al.Evaluating Topic-Driven Web Crawlers[C].In:The Proceedings of 24 th Annual ACM Conference on Research and Development in Information Betrieval,New Orleans,USA,2001:2103~2115
  • 4ITU-T Recommendation X.509.Information Technology-Open-System Interconnection The Directory:Public Key and AttributeCertificate Framework.2000
  • 5Zaiane,Osmar R.Building Virtual Web Views[J].Data andKnowledge Engineering,2001;39(2):143~163
  • 6Chadwick DW,Legg S.Internet X.509 Public Key Infrastructure LDAP Schema and Syntaxes for PMIs.http://www.ietf.org,2002-12
  • 7Housley R,Polk T,Ford W et al.Internet X.509 Public Key Infrastructure Certificate and certificate Revocation List(CRL)Profile[S].RFC3280,2002
  • 8Farrell S,Housley BAn Internet Attribute Certificate Profile for Authorization[S].RFC 3281,2002
  • 9Francis C Pinkas D.Attribute Certificate Policy extension.http://www.ietf.org,2002-10
  • 10Kuo Y F,Chen L S.Personalization technology application to Internet content provider[J].Expert Systems with Applications,2001;21(4):203~215

共引文献25

同被引文献62

  • 1杨勇,汪厚祥,肖乾.远程维修支援系统中角色访问控制策略研究[J].舰船电子工程,2008,28(7):57-61. 被引量:1
  • 2胡朝晖.角色访问控制在分布式环境下的一种实现[J].舰船电子工程,2008,28(8):134-137. 被引量:2
  • 3XU Jing,ZHANG Zhenfeng,FENG Dengguo.Identity Based Threshold Proxy Signature[J].Chinese Journal of Electronics,2006,15(1):183-186. 被引量:6
  • 4Brunette G, Mogull R. Security Guidance for critical areas of fo cus in Cloud Computing V2. I[D]. USA= CSA(Cloud Security Alliance), 2009.
  • 5Bell D E. Secure Computer Systems: Mathematical oundations [R]. Electronic Systems Division, Air Force System Command, Tech. Rep. ESD-TR-73-278, I(AD) 770768,1973.
  • 6Bell D E. Secure Computer Systems: A Mathematical Model [R]. Electronic Systems Division, Air Force System Command, Tech. Rep. ESD-TR 73-278,II(AD)771543,1973.
  • 7Bell D E, I. LaPadula Secure Computer Systems: Mathematical Foundations, MTR 2547 VolI- III, Mitre Corporation, 1996,11.
  • 8徐布克,朱丽娟.NET程序设计案例教程-VisualC#2008(基础篇)[M].中国铁道出版社,2008:75-76.
  • 9MarcoBellinaso.ASP.NET2.0网站开发全程解析(第2版)[M].清华大学出版社,2008:107-173.
  • 10weibo Mao.现代密码学理论与实践[M].北京:电子工业出版社,2004:238-239.

引证文献8

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部