期刊文献+

一种安全隧道网关的设计与实现 被引量:4

Design and Implementation of a Kind of Secure Tunnel Gateway System
下载PDF
导出
摘要 针对应用层客户/服务器系统安全性欠缺的情况,设计、实现了一套基于SSL/TLS协议的安全隧道网关,以提供无缝的安全集成.客户端隧道网关与服务器端隧道网关之间基于X.509证书进行身份认证,并建立SSL/TLS安全链接转发客户端请求与服务器端响应.隧道网关与客户端、服务器之间采用普通TCP/IP链接进行数据传输.隧道网关使已有客户/服务器系统无需任何修改即可享有机密性、完整性和可认证的数据传输.最后给出了网关测试结果与应用实例. Facing with the lack of security in current running client/server systems, this paper designs and imple- ments a kind of secure tunnel gateway system based on SSL/TI~ protocol in order to provide seamless security inte- gration to them. Client tunnel gateway and server tunnel gateway authenticate each other based on X. 509 certificate, and create SSL/TLS connections to transmit the clients' requests and servers' responses. The gateway system uses normal TCP/IP connections to transport data with the clients and servers. It provides confidentiality, integrity and authentication for clients/servers data transmission, which needs no modification to them. Then, this paper presents its test result and application instances.
出处 《微电子学与计算机》 CSCD 北大核心 2011年第4期5-8,共4页 Microelectronics & Computer
关键词 SSL/TLS 隧道网关 客户/服务器系统 安全集成 SSL/TLS tunnel gateway client/server system security integration
  • 相关文献

参考文献6

  • 1Freier Alan O, Philip Karlton, Kocher Paul C. The SSL protoool version 3. 0[EB/OL]. [2010-06-30]. http.//www. mozilla. org/projects/ security/pld/nss/ ssl/ draft302, txt.
  • 2Dierks T, Certicom, Allen C, et al. The TLS protocol version 1.0[EB/OL]. [2010-06-30]. http://www. ietf. org/rfc/rfc2246, txt.
  • 3安庆,陶宏才.C/S模式下文件迁移服务器结构的设计[J].微电子学与计算机,2009,26(4):129-132. 被引量:1
  • 4OpenSSL[EB/OL]. [2010-06-30]. http://www. openssl, org.
  • 5Viega J, Messier M, Chandra P. Network security with OpenSSL[M]. Sebastopd, California: O'Reilly Media, 2002.
  • 6陈英杰,王海欣,白国强,陈弘毅.一种能够实现多种散列函数的VLSI-IP模块设计[J].微电子学与计算机,2010,27(4):89-94. 被引量:1

二级参考文献14

  • 1王兴杰,葛敬国,张道庆,钱华林.网络处理器体系结构分析[J].微电子学与计算机,2006,23(5):89-92. 被引量:4
  • 2严海燕,岳爱菊,葛敬国,钱华林.基于网络处理器的服务质量控制[J].微电子学与计算机,2007,24(3):178-181. 被引量:3
  • 3Richard Stevens W.TCP/IP详解[M].范建华,译.北京:机械工业出版社,2002.
  • 4Ackroyd M. Object-oriented design of a finite state machine [J]. Journal of Object-Oriented Programming, 1995 (7) :50 - 59.
  • 5周天明,汪文勇.TCP/IP网络原理与技术[M].北京:清华大学出版社,1995.
  • 6Haixin Wang, Yao Yue, Chunming Zhang, et al. A novel unified control architecture for a high- performance network security accelerator[C] // Proceedings of the International Conference on Secttrity and Management (SAM' 07 ). Hongkong, 2007(6) : 538 - 544.
  • 7FIPS PUB 180- 1. Secure hash standard(SHA- 1)[S]. National Institute of Standards and Teehnology(NIST), 1995.
  • 8American Bankers Association, Keyed Hash Message Authentication Code[S]. ANSI X9.71, Washington, D C, 2000.
  • 9William Stallings.密码编码学与网络安全:原理与实践[M].4版.北京:电子工业出版社,2006:266-270.
  • 10Frier A, Karlton P, Kocher P. The SSL protocol version 3.0[ EB/OL]. (1996- 11 - 10)[2009- 04- 10]. http:// wp. netscape.com/eng/ssl3/draft302, txt. Netscape.

同被引文献41

引证文献4

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部