期刊文献+

Web服务认证协议模型安全性的研究 被引量:1

Research on Web Services Authentication Protocol Model Security
下载PDF
导出
摘要 通过对入侵者攻击网络协议消息交互能力描述的阐述,构建具有Web服务安全协议模型函数,该模型包括安全协议头与安全体的相关消息。详细介绍了该模型中消息的语法结构和消息内容遵守Web服务安全规范的XML机制。分析了该协议模型安全性机制,并且给出其防止类型漏洞入侵与协议冲突入侵解决方案的思想。 Intruder attacks through the network protocol message described in the interactive ability to build with WS-security protocol model function,the model including security protocol header and its body of the associated message.The model described in detail the message grammar structure and the message content comply with WS-security specifications of the XML Mechanism.Model analysis of the security protocol mechanisms,and give to prevent the type-flaw and protocol conflict solutions thought the invasion.
作者 何旭
出处 《计算机安全》 2010年第1期36-38,共3页 Network & Computer Security
关键词 安全协议 模型 认证 类型漏洞 协议冲突 security protocol model authentication type-flaw protocol conflict
  • 相关文献

参考文献3

二级参考文献15

  • 1卿斯汉.密码学与计算机网络安全.北京:清华大学出版社,2000.
  • 2Burrows M A, Needham R. A logic of authentication.ACM Transactionson Computer Systems, 1990, 8(1):18~36
  • 3Needham R S M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978, 21(12): 993~999
  • 4D Boneh, M Franklin. Identity-based Encryption from the Weil Pairing[ C]. J Kilian. Advances in Cryptology- CRYPTO 2001, volume 2139 of LNCS, Springer-Verlag, 2001. 213-229.
  • 5J C Cha, J H Cheon. An Identity-based Signature from Gap DiffieHellman Groups [ C ]. Y Desmedt. Public Key Cryptogaphy-PKC 2003, volume 2567 of LNCS, Springer-Verlag, 2002.18-30.
  • 6F Zhang, K Kim. Efficient ID-based Blind Signature and Proxy Signature from Bilinear Pairings[ C]. ACISP 03, LNCS 2727, SpringerVerlag, 2003. 312-323.
  • 7M Mambo, K Usuda, E Okamoto. Proxy Signatures for Delegating Signing Operation[ C ]. 3rd ACM Conference on Computer and Communications Security ( CCS' 96), New York: ACM Press, 1996.48-57.
  • 8B Lee, H Kim, K Kim. Strong Proxy Signature and Its Applications[C]. Proc. of the 2001 Symposium on Cryptography and Information Security ( SCIS' 01 ), vol 2/2, Oiso, Japan, 2001. 603-608.
  • 9Guilin Wang, et al. Security Analysis of Some Proxy Signatures[ EB/OL]. Information Security and Cryptology-ICISC 2003, Primary version Available, http :∥eprint. iacr. org/2003/196/.
  • 10A Boldyreva, et al. Secure Proxy Signature Schemes for Delegation of Signing Rights[ EB/OL]. http :∥eprint. iacr. org/2003/096.

共引文献2

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部