期刊文献+

融合网络环境下基于设备指纹的安全管理和加密机制研究

The Security Management and Study of Encryption Mechanism Based on Equipment Fingerprint in the Integrated Network Environment
下载PDF
导出
摘要 随着融合网络的飞速发展,网络设备类型与数量日益增多,网络结构也越来越复杂,对网络安全保障建的要求也逐渐提高.因此,采用传统的引擎标识参数对网络用户身份合法性进行验证,以及单一的SNMPv3网络理安全模型已经不能满足复杂融合网络中设备安全的实际需求.作者基于以上背景,提出了基于设备指纹的SNMPv安全机制构建方案,具有一定的实际应用价值. With the rapid development of the integration network,the style and number of network equipment are increasing quickly,and the structure of network is becoming more and more complex,which causes a demand for building a safe network environment.So,it can't meet the real demand of equipment security in the complex integration network to adopt the traditional engine identification number to verify the user's legal identity mode.Based on the above backgrounds,a program to build the SNMPv3 security mechanism upon equipment fingerprint is put forward,which possesses some practical applied value.
作者 周英
出处 《西华师范大学学报(自然科学版)》 2014年第2期196-200,共5页 Journal of China West Normal University(Natural Sciences)
关键词 融合网络 设备管理 安全管理 integration network equipment fingerprint security management
  • 相关文献

参考文献5

二级参考文献42

  • 1VU L, GUPTA I, NAHRSTEDT K, et al. Understanding overlay characteristics of a large-scale peer-to-peer IPTV system [ J]. ACM Trans on Multimedia Computing, Communications, and Applications, 2010,6 ( 4 ) : 1 - 24.
  • 2GENG Y, WESTHOLM T, KIHL M, et al. Analysis and characterization of IPTV user behavior [ C ]//Proc of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting. 2009 : 13-15.
  • 3QIU Tong-qing, GE Zi-hui, LEE S,et al. Modeling user activities in a large IPTV system[ C]//Proc of the 9th ACM SIGCOMM Conference on Internet Measurement Conference. Chicago: ACM, 2009: 430-441.
  • 4STEINER M, EN-NAJJARY T, BIERSACK E W. Long term study of peer behavior in the KAD DHT [ J]. IEEE/ACM Trans on Networking ,2009,17 (5) : 1371 - 1384.
  • 5VASSILAKIS C, STAVRAKAKIS I. Minimizing node churn in peer-to-peer streaming [ J ]. Computer Communications,2010,33 (14) : 1598-1614.
  • 6LIU Yong, GUO Yang, LIANG Chao. A survey on peer-to-peer video streaming systems [ J ]. Peer-to-Peer Networking and Applications ,2008,1 ( 1 ) : 18-28.
  • 7JINYANG L, STRIBLING J, MORRIS R, et al. A performance vs. cost framework for evaluating DHT design tradeoffs under churn [ C]//Proc of the 24th IEEE International Conference on Computer Communications. [ S. l. ] :IEEE, 2005 : 225-236.
  • 8WANG Feng, LIU Jiang-chuan, XIONG yong-qiang. Stable peers : existence, importance, and application in peer-to-peer live video streaming [ C ]//Proc of the 27th IEEE Conference on Computer Communications. [ S. l. ] : IEEE ,2008 : 1364-1372.
  • 9WANG Xiao-ming, YAO Zhong-mei, DOGUINOV L. Residual-based estimation of peer and link lifetimes in P2P networks [J]. IEEE/ ACM Trans on Networking,2009,17(3) :726-739.
  • 10STUTZBACH D, REJAIE R. Improving lookup performance over a widely-deployed DHT[ C ]//Proc of the 25 th IEEE International Conference on Computer Communications. [ S. l. ] : IEEE, 2006:1-12.

共引文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部