期刊文献+

网站可信标识架构与查验协议研究 被引量:1

Research on Trusted Website Identification Architecture and Check Protocol
下载PDF
导出
摘要 高可信性是下一代互联网的重要特征,主要包括服务提供者可信、信息传输可信和终端用户可信,其中服务提供者的身份可信是构建可信网络的前提。为此,提出一种网站身份可信标识的体系结构,描述基于域名资源记录的网站可信标识查验协议。通过该协议,用户可在各种互联网应用中方便地查询服务提供者的身份信息。实验结果表明,该体系结构与相关查询协议在效率、易用性、可扩展性等方面均可满足实际应用需要,单机查询性能达到15万次/s。 High reliability is an important characteristic of Next Generation Internet(NGI). The Internet is on the way to trusted network. The trusted network includes the trust of service providers, the trust of the network information transmission and the trust of end-users. The identity trust of service providers is the important base of the trusted network. Aiming at this problem, this paper describes a technical architecture of a website trusted service and explains the Domain Name Server(DNS)-based check protocol in details. By the check service, users can get the Internet service provider's information conveniently from Internet applications. Experimental results show that this architecture and the related cheek protocol can meet the needs of the practical application in terms of efficiency, usability, scalability, etc. The check performance of one machine can reach 150 000 times per second.
出处 《计算机工程》 CAS CSCD 2014年第1期20-24,30,共6页 Computer Engineering
基金 中国下一代互联网示范工程基金资助项目(CNGI-12-02-007) 国家发改委2012年信息安全专项基金资助项目(发改办高技[2013]1309号) 北京市科委创新环境与服务体系建设基金资助项目(Z131101000113046) 北京市怀柔区2012年度优秀人才培养基金资助项目(京怀组字[2012]46号)
关键词 可信网络 可信标识 域名服务器 资源记录 数字证书 签名 trusted network trusted identification Domain Name Server(DNS) resource record digital certificate signature
  • 相关文献

参考文献12

  • 1中国互联网信息中心.第31次中国互联网络发展状况调查统计报告.
  • 2中国国务院新闻办公室.中国互联网状况.
  • 3中国电子商务协会可信电子商务推进中心;中国可信网站应用推进联盟;北龙中网(北京)科技有限责任公司.2012年中国网站可信验证行业发展报告.
  • 4International Standardization Organization. Information Technology--Security Techniques--Evaluation Criteria for IT Security--Part 1:Introduction and General Model[S].2009.
  • 5Gates B. Trustworthy Computing[EB/OL].http://www.wired.com/techbiz/media/news/2002/01/49826,2002.
  • 6林闯,田立勤,王元卓.可信网络中用户行为可信的研究[J].计算机研究与发展,2008,45(12):2033-2043. 被引量:78
  • 7GENI. Global Enviroment for Networking Innovations[EB/OL].http://www.geni.net/,2013.
  • 8FIND. Future Internet Design[EB/OL].http://www.nets-find.net/,2013.
  • 9吴建平,毕军.可信任的下一代互联网及其发展[J].中兴通讯技术,2008,14(1):8-12. 被引量:8
  • 10林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252

二级参考文献45

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 5Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 6Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 7Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 8International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 9Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 10Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743

共引文献439

同被引文献10

  • 12010年百度域名被劫持事件罐基百科.http://zh.wikipedia.org/wiki/2010年百度域名被劫持事件.
  • 2Intemet Corporation for Assigned Names and Numbers. TLD DNSSEC Report. http://stats.research.icann.org/dns/tld_rep ort/archive/20140131.00010 1.html.
  • 3Laurie B, Sisson G, Arends R. X.509 Extensions for IP addresses and AS identifiers. RFC3779, 2008.
  • 4Wikipedi& Dan Kaminsky. http://en.wikipedia.org/wiki/Dan_ Kaminsky.
  • 5Arends R, Austein R, Larson M, Massey D, Rose S. DNS security introduction and requirements. RFC4033, 2005.
  • 6Arends R, Austein R, Larson M, Massey D, Rose S. Resource records for the DNS security extensions. RFC4034, 2005.
  • 7Arends R, Austein R, Larson M, Massey D, Rose S. Protocol modifications for the DNS security extensions. RFC4035, 2005.
  • 8Laurie B, Sisson G, Arends R, Blacka D. DNS security (DNSSEC) hashed authenticated denial of existence. RFC5155, 2008.
  • 9Intemet corporation for assigned names and numbers. DNSSEC Surpasses 50%. http://blog.icann.org/2014/01/ dnssec-surpasses-50/.
  • 10林闯,田立勤,王元卓.可信网络中用户行为可信的研究[J].计算机研究与发展,2008,45(12):2033-2043. 被引量:78

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部