期刊文献+

交通视频监控系统中的双证书访问控制研究

Bi-certificate Access Control in Communication Video Monitoring System
下载PDF
导出
摘要 针对目前规划中的四川交通视频监控系统安全建设需求,提出了一种交通广域网环境下基于PKI/PMI架构,利用其公钥证书和属性证书相结合的方式实现安全访问的双证书访控模型。该安全基础模型从身份认证和授权机制两方面较好地解决了视频监控数据的访问控制问题。 In order to make sure a smooth and efficient transportation thoroughfare,this paper puts forward a bi-certificate video monitoring model based on PKI/PMI frame,which can realize the safe visit under the traffic WAN environment by the way of combining public key certificate with attribute certificate.This safety base model can nicely solve the problem of access control of the video monitoring data from identity authentication and authorization mechanism.
作者 许长枫
出处 《交通信息与安全》 2012年第3期118-122,共5页 Journal of Transport Information and Safety
关键词 交通 视频监控 访问控制 communication video monitoring access control
  • 相关文献

参考文献9

  • 1邓集波,洪帆.基于任务的访问控制模型[J].软件学报,2003,14(1):76-82. 被引量:222
  • 2ISO/IEC 9594-8/ITU Recommendation X. 509. In- formation technology-open system interconnection: The directory Public key and attribute certificate frameworks [S]. International Telecommunication Union, 2001.
  • 3谭寒生 张舰 等.PMI与PKI模型关系研究[J].计算机应用,2002,(8):86-88.
  • 4尹刚,王怀民,滕猛.基于角色的访问控制[J].计算机科学,2002,29(3):69-71. 被引量:17
  • 5谭强,黄蕾.PMI原理及实现初探[J].计算机工程,2002,28(8):187-189. 被引量:24
  • 6Farrell S, Housley R. An intemet attribute certificate profile for authorization[S]. RFC 3281, IETF, 2002.
  • 7安晓江,李大兴.基于角色的代理模型的实现[J].计算机工程,2004,30(10):62-64. 被引量:4
  • 8Hui Xie, Bin Zhang, Dianyou Hu. A role-based dy- namic authorization model and its implementation in PMI[C]. Z008 International Conference,New York: ACM Press, 2008 : 661-664.
  • 9Prayogi A A,JinKu Park, Eenjun Hwang. Selec- tive role assignment on dynamic location-based ac- cess control convergence information technology [C]//2007 International Conference, New York: ACM Press,2007 : 2136-2135.

二级参考文献13

  • 1[1]ITU-T Recommendation X.509.Information Technology-Open System Interconnection- The Directory:Public Key and Attribute Certificate Framework.2000
  • 2[2]Oppliger R,Permul G,Strauss C.Using Attribute Certificates to Imple-ment Role-based Authorization and Access Controls.http:∥www.entrust, com
  • 3[3]Entrust XML Strategy for Authorization. http:∥www.entrust.com
  • 4[4]ISO 1018 1-3.1nformation Technology - Open Systems Interconnection Security frameworks for Open System:Access Control Framework.
  • 5[5]Boeyen S.X.509 (2000):4th Edition:Overview of PKI & PMI Frame-works.http:∥www.entrust.com
  • 6[1]Sandhu R S, Coyne E J, Feinstein H L, et al. Role-based Access Control Models. IEEE Computer, 1996,29(2): 38-47
  • 7[2]Barka E, Sandhu R. Framework for Role-based Delegation Models. New Orleans, LA: In Proceedings of 16th Annual Computer Security Application Conference, 2000-12:168-176
  • 8Oralce Corporation.ORACLE7 Server SQL Language Reference Manual.Dec.1992
  • 9Sandhu R S,et al.Role-based Access Control Models ,unpublished journal article
  • 10Department of Defense.Trusted Computer Security Evaluation Criteria.DoD 5200.28-STD,1985

共引文献265

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部