期刊文献+

两层架构的可信身份服务平台研究与设计 被引量:1

RESEARCH AND DESIGN OF A PLATFORM FOR TRUSTED IDENTITY SERVICE WITH TWO-TIER ARCHITECTURE
下载PDF
导出
摘要 针对当前网络环境中基于用户真实身份安全管控需求与用户隐私保护需求之间的矛盾,引入主管机构作为可信方,将用户的真实身份管理与虚拟业务账号管理独立开来,建立两层架构的可信身份服务平台。平台通过身份绑定机制,建立用户业务账号与其真实身份之间的映射关系,实现基于真实身份的信任保障;并根据业务的应用场景配置策略为其提供用户属性,以保障用户隐私安全。 In view of the contradiction in current cyberspace field between the need of safety management and control based on users real identity and the need of users' privacy protections,this paper proposes the establishment of a trusted identity service platform with two-tier architecture which provides users real identity management capabilities completely independent to virtual business account management system by introducing the competent authorities as the trusted party.On the platform,a mapping relationship between user's real identity and his business account is established through the identity binding mechanism to achieve real identity-based trust guarantee.On the other hand,users' attributes can be released to the platform according to configuration policy of the application scenario of business for protecting users' privacy safety.
出处 《计算机应用与软件》 CSCD 北大核心 2012年第3期1-4,8,共5页 Computer Applications and Software
基金 国家自然科学基金项目(60803129) 中国科学院知识创新工程重要方向项目(YYYJ-1013)
关键词 身份管理服务 身份绑定 属性保护 隐私安全 Identity management service Identity binding Attributes protection Privacy safety
  • 相关文献

参考文献2

二级参考文献14

  • 1Maler E,Reed D. The Venn of Identity-Options and Issues in Federated Identity Management[J ]. IEEE Security & Privacy,2008,6(2) : 17 - 23.
  • 2Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Mamgement[ C]//Proeeedings of the IEEE Conference on Security and Privacy. Oakland,CA: [ s. n. ], 1996.
  • 3Winsborough W, Seamons K. Automated Trust Negotiation [ C]//DARPA Information Survivability Coherence and Exposition. Hilton Head, South Carolina: [s. n. ], 2000.
  • 4Li Xiong, Liu Ling. A Reputation - Based Trust Model for Peer - to- Peer Ecommerce Communities[C]//Proceedings of IEEE Conference of E-Commerce. USA: ACM Press,2003: 275 - 284.
  • 5Josang A, Fabre J,Hay B, et al. Trust Requirement in Identity Management[ J ]. Australian Computer Society,2005,44: 99 - 108.
  • 6Xue G T, You J Y,Jia Z Q.An Interest Group Model for Content Location in peer- to- peer systems[C]//Proceedings of the IEEE International Conference on E - Commerce Technology for Dynamic E - Business. [s.l. ] : [s. n. ] ,2004.
  • 7南湘浩,陈钟.网络安全技术概要[M].北京:国防工业出版社,2003.
  • 8南相浩,唐文.ECC组合公钥[A].中国计算机学会信息保密专业委员会论文集[C].2001,11(9):341-347.
  • 9A Shamir.Identity-Based Cryptosystems And Signature Schemes[A].Proceedings of CRYPTO`84[C].Lecture Notes in Computer Science 196,Springer-Verlag,1985.47-53.
  • 10D Boneh, M K Franklin.Identity-Based Encryption from the Weil Pairing[A].Proceedings of Crypto '01[C].Springer-Verlag,2001,213-229.

共引文献23

同被引文献8

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部