期刊文献+

一种针对云计算登陆问题的认证技术 被引量:6

An Authentication Technology of Cloud Computing Landing
下载PDF
导出
摘要 被誉为IT界"工业革命"的云计算已经开始了其普及化的道路。传统的单点登录方式已经满足不了其对安全性的需求。提出了一个新的双因子登陆模型,使认证码的产生变得动态化且不再需要网络进行传播,从而可使用户登录信息的安全性得到很大程度的保障。 Known as the IT "industrial revolution",Cloud computing has already begun its path of popularity,but the traditional single sign-on approach has failed to meet its security needs.A new two-factor login model is proposed,which can make the generation of authentication codes dynamic and authentication codes no longer need to communicate by network.These can protect the security of user login information in a large degree.
出处 《科学技术与工程》 2011年第6期1375-1377,共3页 Science Technology and Engineering
基金 山东省自然科学基金云计算中动态防御机制及安全技术(ZR2009GM017)资助
关键词 云计算 双因子登录认证 JAVA cloud computing two-factor login authentication Java
  • 相关文献

参考文献2

  • 1详解云计算.http://www.microvoip.com/cloud/news/201006/128297.html.
  • 2Geeglo.帐号与密码:解析互联网行业身份认证术.http://www.krshadow.com/html/tech/2010-09/14821.html.

同被引文献48

  • 1王昆,沙瀛,谭建龙.基于Cookie劫持的Deep-Web用户数据安全性分析[J].计算机研究与发展,2012,49(S2):17-22. 被引量:3
  • 2宁玉梅,丁振国,曾平,王晨.基于双重身份认证的云计算访问控制模型[J].华中科技大学学报(自然科学版),2012,40(S1):288-292. 被引量:4
  • 3张大朋,蔡克,张敏,徐震.云计算数据安全支撑平台架构研究[J].计算机研究与发展,2011,48(S3):261-267. 被引量:11
  • 4Gartner.Garmer Says Cloud Computing Will Be As Influential As E-business[EB/OL].http://www.gartner.com/it/page.jsp?id=707508, 2008-06-26.
  • 5Tim Mather, Subra Kumaraswamy, Shahed Latif Cloud SecuriW and Privacy[M]. O'Reilly Media, 2009.
  • 6毛文波无信任链可信计算模型与可信虚拟化云计算数据中心解决方案[EB/OL]http://blog.csdn.net/wellhomao/article/details/6902379,2011-10-24.
  • 7Li H, Dai Y, Tian L,et al. Identity-based authentication forcloud computing[C]//In CloudCom,09: Proceedings of the1st International Conference on Cloud Computing,Beijing,china, 2008,9: 157-166.
  • 8Yan Liang, Rong Chun ming, Zhao Gan sen. Strengthencloud computing security with Federal identity managementusing hierarchical identity - based cryptography [ C] //Cloud-Com,09: proceedings of the 1st international conference oncloud computing, Beijing, China, 2009 : 167-177.
  • 9洪澄,张敏,冯登国.AB-ACCS:—种云存储密文访问控制方法[J].计算机研究与发展,2010,47(Suppl) :259-265.
  • 10Atallah M J, Blanton M, Fazio N,et al. Dynamic and effi-cient key management for access hierarchies[J]. ACM TransInf Syst Secur 2009 , 12(3) : 1-43.

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部