期刊文献+

SSL VPN中基于Cookie技术的可靠认证方案 被引量:1

Authentication Scheme Based on Cookie Technology in SSL VPN
下载PDF
导出
摘要 针对安全套接层协议的虚拟专用网络SSLVPN网关的特点,提出一种基于Cookie技术的可靠认证方案,该方案中Cookie采用加密技术,攻击者无法伪造和篡改数据;此外,方案采用基于Hash和链表的数据结构,结合安全Cookie协议,不仅对内部站点的信息进行隐藏,还实现了对用户信息的认证和授权。同时,提出基于角色的访问控制模型,通过职责分离和最小特权的原则来满足SSLVPN访问控制的要求。该方案对于身份认证来说是一种很好的扩充,可以有效加强SSLVPN网关的安全性。实验测试验证了该安全认证方案的可行性和可靠性。 A security authentication scheme based on Cookie technology for the characteristics of SSL VPN gateway is proposed.The data can not be forged and tampered by attackers as Cookie in the scheme used encryption technology.In addition,the scheme uses a data structure based on Hash and linked lists,as well as secure Cookie protocol,which not only hides information of the internal site,but also achieves the authentication and authorization of user information.Meanwhile,a role-based access control model is proposed,which meets the requirements of SSL VPN access control with the principle of duty separation and least privilege.The scheme is a good extension for authentication and effectively enhances the security of SSL VPN gateway.The experimental test results show that the security authentication scheme is feasible and reliable.
作者 黄东
出处 《测控技术》 CSCD 北大核心 2013年第7期83-86,共4页 Measurement & Control Technology
基金 四川省宜宾市宜宾学院校基金资助项目(2010Z10)
关键词 安全套接层协议 虚拟专用网络 认证方案 COOKIE技术 secure sockets layer(SSL) virtual private network(VPN) authentication scheme Cookie technology
  • 相关文献

参考文献8

二级参考文献33

  • 1欧阳凯,周敬利,夏涛,余胜生.基于虚拟服务的SSL VPN研究[J].小型微型计算机系统,2006,27(2):228-232. 被引量:15
  • 2梁晋.电子商务核心技术-安全电子交易协议的理论与设计[M].西安:西安电子科技大学出版社,2001.
  • 3COHEN R. On the establishment of an access VPN in broadband access networks[J]. Communications Magazine, IEEE, 2003, 41(2): 156-163.
  • 4贾晶.信息系统的安全与保密[M].北京:清华大学出版社,2005.
  • 5Hastings NE,McLean PA.TCP/IP spoofing fundamentals.In:Proc.of the 15th Annual Int'l Phoenix Conf.on Computers and Communications.IEEE Computer Society,1996.218-224.http://sciencestage.com/d/3840792/tcp/ip-spoofing-fundamentals.html.
  • 6Zhao X,Chen DX,Xie L.Study on IP Haijack.Journal of Software,2000,11(4):515-519 (in Chinese with English abstract).http://www.jos.org.cn/ch/reader/view_abstract.aspx?flag=1&file_no=20000414&journal_id=jos.
  • 7Schuba CL,Krsul IV,Kuhn MG.Analysis of a denial of service attack on TCP.In:Proc.of the IEEE Symp.on.Security and Privacy.IEEE Computer Society,1997.208-223.http://cs.unc.edu/~fabian/course_papers/schuba.pdf.
  • 8Park K,Lee H.On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets.In:Proc.of the ACM SIGCOMM 2001.San Diego:ACM Press,2001.15-26.http://www.cs.purdue.edu/nsl/dpfsigcomm01.pdf.
  • 9Liu X,Yang XW,Wetherall D.Passport:Secure and adoptable source authentication.In:Proc.of the 5th USENIX NSDI.USENIX Association Press,2008.http://www.seattle.intel-research.net/pubs/passport-nsdi.pdf.
  • 10David GA,Hari B,Nick F,Teemu K,Daekyeong M,Scott S.Accountable Internet protocol (AIP).In:Proc.of the ACM SIGCOMM 2008.Seattle:ACM Press,2008.339-350.http://www.cs.cmu.edu/~dga/papers/aip-sigcomm2008.pdf.

共引文献37

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部