期刊文献+

云计算环境下统一身份认证平台的设计与实现 被引量:5

Unified Authentication Platform Based on Cloud Computing
下载PDF
导出
摘要 对云计算及统一身份认证的基本概念和国内外对此项技术的研究和发展现状进行了简要介绍。提出了一种统一身份认证平台的设计和实现,并给出了该平台在云计算环境下的应用实例。 This paper puts forward the concept and research status of cloud computing and unified authentication,then introduces the unified authentication platform development,and an application of the platform mentioned is implement as a case in cloud computing environment.
出处 《工业控制计算机》 2013年第7期91-92,共2页 Industrial Control Computer
关键词 云计算 统一身份认证 信息安全 cloud computing unified authentication information security
  • 相关文献

参考文献5

  • 1雷波,郭玉东.基于代理的单点登录系统的设计[J].计算机与现代化,2009(2):39-41. 被引量:1
  • 2嵇智辉,倪宏,刘磊,匡振国.一种基于双令牌机制的单点登录模型研究[J].计算机工程与应用,2008,44(30):131-134. 被引量:5
  • 3ChalandarE.Darvish P.Rahmani M.A centralized cookie -based single sign—on in distributed Systems[C].informationand Communications Technology 5th International Confer-ence,2007,163-165.
  • 4ThomasGroB. Security Analysis of the SAML Single Sign-onBrowser/Artifact Profile [R]. IBM Zurich Research LaboratoryZurich,Switzerland , 2002.
  • 5Wu.T.The Secure Remote Password Protocol [J].In Proceed-ings of the Internet Society Network and Distributed SystemSymposium, March 1998:97-111.

二级参考文献21

  • 1王倩宜,李润娥,李庭晏.统一用户管理和身份认证服务的设计与实现[J].实验技术与管理,2004,21(3):7-12. 被引量:34
  • 2庞红玲,张浩军,武东英.使用XKMS的开放式网格服务的证书验证方案[J].微电子学与计算机,2005,22(6):132-134. 被引量:1
  • 3裴艳琴,杨寿保,房向明,郭磊涛.基于SAML的网格策略部署和认证机制[J].计算机工程,2007,33(1):170-172. 被引量:4
  • 4武文丽,黄永忠,陈海勇.基于安全断言标记语言实现单点登陆[J].计算机工程与设计,2007,28(4):785-788. 被引量:3
  • 5Cantor S,Kemp J,Philpott R,et al.Asserlions and protocols for the OASIS security assertion markup language(SAMI,) V2.0[S/OL].(2005). htlp ://docs.oasis-open.org/security/saml/v2.0/.
  • 6Hirsch F,Philpott R,Maler E.Seeurity and privacy eonsiderations for the OASIS security assertion markup language(SAML) V2.0[S/ OL]. ( 2005 ).http ://docs.oasis-open.org/securily/saml/v2.0/.
  • 7Samar V.Single sign-on using cookies for Web applications[C]// Proceedings IEEE 8th International Workshops on Enabling Technologies : Infrastructure for Collaborative Enterprises, 16 -18 June 1999: 158-163.
  • 8Zhao Gang,Zheng Dong,Chen Ke-fei.Design of single sign-on[C]// Proc of IEEE Int'l Conf on E-Commerce Technology for Dynamic E-Business, 2004: 253-256.
  • 9Sun^TM. One Directory Server: Introduction[ DB/OL]. http://docs. sun. com/source/816-6698-10/intro. html, 2003-12-20.
  • 10Sumalatha Adabala, Matsunaga A, et al. Single sign-on in In-VIGO: role-based access via delegation mechanisms using short-hved user identities [ C ]// Proceedings of 18th International Parallel and Distributed Processing Symposium. 26-30 April, 2004:22-23.

共引文献4

同被引文献38

  • 1钱承武.基于深度学习的目标检测算法研究进展[J].无线通信技术,2022,31(4):24-29. 被引量:4
  • 2王张宜,李波,张焕国.Hash函数的安全性研究[J].计算机工程与应用,2005,41(12):18-19. 被引量:26
  • 3卢官明,李海波,刘莉.生物特征识别综述[J].南京邮电大学学报(自然科学版),2007,27(1):81-88. 被引量:33
  • 4李晓飞.云计算环境下的用户隐私问题浅析[J].南昌教育学院学报,2013(2):194+196.
  • 5Security and high availability in cloud computing environments [M]. Is. 1. ]:IBM,2011.
  • 6Khalil Issa M, Khreishah Adallah, Bouktif Salah, et al. Secur- ity Concerns in Cloud Computing [ C ]~ Las Vegas, NV : Pro- ceeding of the 2013 Tenth International Conference on Infor- mation Technology: New Generations ( ITNG ) : IEEE, 2013 : 15 -17.
  • 7Yang Yansi, Yang Yingyun, Niu Lipi, et al. Hardware system design of SD card reder and image processor on FPGA ~ C ]. Shenzhen: Proceeding of the 2011 IEEE International Confer- ence on Information and Automation ( ICIA ) : IEEE, 2011 : 6-8.
  • 8Yang Jun, Li Na, Ding Jun. A design and implementation of high - seed 3des algorithm system [ C ]. Sanya: Proceeding of the 2009 TITME'09 Second International Conference on Fu- ture Information Technology and Management Engineering: IEEE ,2009 : 13 - lg.
  • 9李歆,管党根.数字证书认证技术在资料库等系统中的应用[J].人民长江,2009,40(4):74-76. 被引量:1
  • 10周楝淞,杨洁,谭平嶂,庞飞,曾梦岐.身份认证技术及其发展趋势[J].通信技术,2009,42(10):183-185. 被引量:25

引证文献5

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部