期刊文献+

基于SPKI/SDSI证书链搜索算法与访问控制模型设计

Design an Access Control Model and a Certificate Chain Search Algorithm Based on the SPKI/SDSI
下载PDF
导出
摘要 目前,PKI是解决信息安全问题的一种最成熟的技术手段,能够有效解决大部分安全问题,但是PKI无法实现网络上的资源控制。SPKI/SDSI可以有效解决资源控制问题,然而由于证书链搜索算法复杂度高,目前基于SPKI/SDSI设计的访问控制模型,都存在一定的问题。紧紧围绕受控资源的访问保护,基于SPKI/SDSI设计了一个高效的分布式访问控制模型,同时提出了一种新的证书链搜索算法,在海量证书库中能快速的查找证书链,并通过模拟实验,验证新的算法的效率,实验结果表明证书数量越大,文中的算法优势越明显。 Currently, the most sophisticated technical means to resolve the problem about network security is PKI. But the PKI can not control the protected resources on the network. SPKI/SDSI could resolve this problem effective- ly, howerver, because the complexity of the certificate chain discovery algorithms is high, there are some problems in existing access control models that based on SPKI/SDSI certificates. The paper focuses on the access of the protected resources on the network, designs an efficient distributed access control model that based on SPKI/SDSI certificates. Meanwhile, proposes a new certificate chain discovery algorithm, so that could find a certificate chain in the mass certificate repository quickly. At last, do some simulation experiments to test the efficiency of the algorithm proposed in this paper. The results shows that the greater the number of the certificates, the more advantages of the proposed algorithm in this paper.
作者 赵晔晖
出处 《成都信息工程学院学报》 2012年第2期174-179,共6页 Journal of Chengdu University of Information Technology
关键词 SPKI/SDSI PKI 证书链搜索 分布式 访问控制 SPKI/SDSI PKI certificate chain discovery distributed access control
  • 相关文献

参考文献9

  • 1Carl Ellison. SPKI/SDSI and the Web of Trust[J ]. Journal of Computer Security, 2010,11(6) :132 - 141.
  • 2Buter W Lampson, Martin Abadi, Michael Burrows, et al. Authentication in Distributed Systems: Theory and Practice[J]. ACM Transactions on Computer Systems,2011,10(4) :265 - 310.
  • 3B Lampson, Sean Smith . Using SPKI/SDSI for distributed maintenance of attribute release polices in shib- bolefth[J ]. Journal of Computer Security, 2010,9 (4) : 235 - 239.
  • 4Nazareth S, B Schneier. Ten Risk of PKI:What You are Not Beinig Told About Public Key Infrastructure[J 1. Communication of the ACM, 2009,32 (6).
  • 5C Ellison, B Schneier. Risks of PKI Electronic J ]. Communication of the ACM, 2010,43 (2).
  • 6Sameer Ajmani, Dwaine E Clark, Chuang-Hua Moh, etal. ConChord: Cooperative SDSI Certificate Storage and Name Resolution[J ]. IEEE Communications, 2010, 11 (6) :132- 141.
  • 7Martin Abadi. On SDSI's Linked Local Name Spaees[J 1. Journal of Computer Security, 2008, 6(1 -2) .3 - 21.
  • 8Xavier Orri, J M Mas, Octalis SA. SPKI-XML Certificate Structure. draft-orri-spki-xml-cert-struc-00, ext [ EB/OL]. http.//www, eeom. tifr. res. in/-wvp/pki/SPKI/draft-orri-spki-xml-cert-struc-00, pdf, 2010.
  • 9Yki Kortesniemi. SPKI Performance and certificate Chain Reduetion[J 1. Journal of Computer Security, 2010, 15(9) : 131 - 137.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部