期刊文献+

基于身份位置分离系统的互联网安全模式研究

Research on Internet Security Model Based on ID/Locator Split Architecture
下载PDF
导出
摘要 基础网络作为智能管道,应该在以开放、简单和共享为宗旨的技术优势基础上,建立完备的安全保障体系,从网络体系结构上保证网络信息的真实来源,实现可靠的网络、业务和用户综合管理能力。本文分析互联网安全问题的同时,提出了基于身份位置分离系统的互联网安全模式,通过建立互联网统一标识管理体系,逐步形成互联网事件因果关系逻辑结构的可信的生态系统。 As intelligent pipeline,basic network should in the technical advantage for the purpose of open,simple and sharing based on,to establish a complete and perfect security system,to ensure the true source of network information by means of the network architecture,to achieve reliable comprehensive management capabilities for network,service and subscriber.This paper analyses the internet security problem,proposes an internet security model based on ID/locator split architecture,through the establishment of internet unified identity management system,gradually forms a credible ecological system of internet events causal relationship logical structure.
作者 吴强 陈琳
出处 《电信科学》 北大核心 2011年第11期99-104,共6页 Telecommunications Science
关键词 标识管理体系 互联网安全模式 身份位置分离 identity management system internet security model ID/locator split
  • 相关文献

参考文献5

二级参考文献12

  • 1张宏科,苏伟.新网络体系基础研究——一体化网络与普适服务[J].电子学报,2007,35(4):593-598. 被引量:126
  • 2Zhiwei Yan, Huachun Zhou, Hongke Zhang. A novel mobility management mechanism based on an efficient locator/ID separation scheme. In: Future Information Networks, 2009(ICFIN 2009).
  • 3Ved P Katie, Hldekl Otsukl, Masugl Inoue. An ID/locator split architecture for future networks. IEEE Communications Magazine, 2010, 48(2).
  • 4Hideki Toshinaga, Koki Mitani. Wide area ubiquitous network service system. NTY Technical Review, 2009(10).
  • 5Kazman R, Klein M, Barbacci M. The Architecture Tradeoff Analysis Method. Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, Monterey. CA, IEEE Computer Society, 1998-08
  • 6Linger R C. Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software. Proceedings of 32nd Annual Hawaii International Conference on System Sciences, Maui,Hawaii, (HICSS-32), IEEE Computer Society, 1999- 01
  • 7Ellison R J, Linger R C, LongstaffT,et al. A Case Study in Survivable Network System Analysis. Software Engineering Institute Technical Report No. CMU/SEI-98-TR-014, 1998-09
  • 8Jha S, Wing J M, Linger R, et al. Analyzing Survivability Properties of Specifications of Networks. In: Proceedings of the International Conference on Dependable Systems and Networks, Workshop on Dependability Despite Malicious Faults, New York City, NY, 2000-06
  • 9Ellison. Survivable Network Systems: An Emerging Discipline.Carnegie Mellon University/Software Engineering Institute, CMU/SEI -97-TR-013, 1997-11
  • 10曹锐,吴建平,徐明伟.互联网命名问题研究[J].软件学报,2009,20(2):363-374. 被引量:12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部