期刊文献+

一种通用的身份模型及其构建流程

General Identity Model and Its Construction Process
下载PDF
导出
摘要 针对身份管理系统的功能需求以及不同身份管理系统间的融合需求,提出一种通用的身份模型。该模型由用户全局身份标识、本地身份标识、临时身份标识、访问信息组、用户凭证组、用户属性组、可信域组所组成。在此基础上,给出该模型的分阶段构建流程,完成属性和凭证信息的搜集工作以及可信域和访问信息的更新工作。应用结果表明,该模型对现有身份管理系统的融合、身份保护等功能提供了技术支持。 Aiming to satisfy identity management function requirements such as federal cross domain access, trust delegation and privacy protection, and the requirements of integration among different identity management systems, it proposes a general identity model in this paper. These models consist of global identifier, local identifier, temp identifier, access information set, credential set, attribute set and trusted domain set. Then the construction process of this model which includes two stages is shown, the collection of attributes and credentials, the update of trusted domains and access information is finished during these two stages. Application result shows that this model provides good support for current identity management systems to implement integration 'and identity protection.
出处 《计算机工程》 CAS CSCD 2012年第3期119-120,123,共3页 Computer Engineering
关键词 通用身份模型 身份管理 构建流程 信任代理 general identity model identity management construction process trust agency
  • 相关文献

参考文献8

  • 1Bertino E, Paci F, Shang N. Digital Identity Protection-concepts and Issues[C] //Proc. of ARES’09. Fukuoka, Japan: [s. n.] , 2009.
  • 2Josang A, AlZomai M, Suriadi S. Usability and Privacy in Identity Management Architectures[C] //Proc. of Australasian Information Security Workshop. Ballarat, Australia: [s. n.] , 2007.
  • 3Maliki E I, Seigneur T. A Survey of User-centric Identity Mana- gement Technologies[C] //Proc. of IARIA’07. Valencia, Spain: [s. n.] , 2007.
  • 4Damiani E, Vimercati D C D, Samarati P. Managing Multiple and Dependable Identities[J]. IEEE Internet Computing, 2003, 7(6): 29-37.
  • 5McLaughlin M P, Jennings B. A Model for Identity in Digital Ecosystems[C] //Proc. of DEST’09. Istanbul, Turkey: IEEE Press, 2009: 295-300.
  • 6Cameron K. The Law of Identity[EB/OL]. (2005-04-11). http:// ts-si.org/files/TheLawsOfIdentity.pdf.
  • 7Cao Yuan, Yang Lin. A Survey of Identity Management Tech- nology[C] //Proc. of ICITIS’10. Beijing, China: [s. n.] , 2010.
  • 8张红旗,张文波,张斌,曹炳华.网格环境下基于身份的跨域认证研究[J].计算机工程,2009,35(17):160-162. 被引量:13

二级参考文献5

  • 1路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 2Foster I, Kesselman C, Tsudik G, et al. A Security Architecture for Computational Grids[C]//Proceedings of the 5th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 1998: 83-92.
  • 3Wenbo M. An Identity-based Non-interactive Authentication Framework for Computational Grids[R]. Hewlett-Packard Laboratories, Technical Report: HPL-2004-096, 2004.
  • 4Li Hongwei, Sun Shixin. Identity-Based Cryptography for Grid[C]// Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/ Distributed Computing. Washington, USA: IEEE Computer Society 2007: 132-137.
  • 5杨浩淼,孙世新,徐继友.一种制造网格环境下的用户代理的签名方案[J].计算机集成制造系统,2007,13(11):2276-2283. 被引量:1

共引文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部