期刊文献+

远程访问安全认证方案的设计与分析 被引量:5

Design and Analysis of an Authentication Solution for Remote Access
下载PDF
导出
摘要 结合高性能访问服务器的研制 ,对远程访问环境下的安全认证进行了研究 ,给出了一种用于远程访问的具有Client/Server结构的分布式安全认证模型 .该模型可将远程用户和访问服务器的所有敏感信息放在认证服务器中单一的、集中的数据库内 ,而不是分散在网络的不同设备中 .该模型将远程访问用户的认证及访问授权和实际的访问分开处理 ,可极大地提高系统的安全性和灵活性 .依此模型并基于消息认证码MAC技术 ,设计并实现了一种远程访问安全认证方案 ,并对认证方案的安全性 (包括抵御各种攻击的能力 )和MD5算法对攻击的抵抗能力进行了分析和讨论 .分析结果、攻击测试和系统运行测试均表明了认证方案的正确性和有效性 ,同时也证明系统具有很高的安全性 ,从而实现了安全性、对用户透明、便于管理和可扩充的系统设计目标 . An authentication solution for remote access based on both a security authentication model and MAC has been designed and implemented to the high performance network access server. This model possesses the structure of client/server. It can greatly enhance the security and scalability of authentication system. Attacks by hackers could be readily identified thus achieving protection to the system. The main objectives of this approach are security, user friendly and easily implemented.
出处 《西安交通大学学报》 EI CAS CSCD 北大核心 2001年第8期829-833,共5页 Journal of Xi'an Jiaotong University
基金 国家"八六三"计划资助项目 (86 3- 30 6 -ZD - 0 7- 0 3)
关键词 网络安全 远程访问 认证 计算机网络 安全认证模型 Computer crime Computer networks Electronic document identification systems Security of data
  • 相关文献

参考文献6

  • 1[1]Prabhu M M, Raghavan S V. Security in computer networks and distributed systems [J].Computer Communications,1996,19(4):378~388.
  • 2[2]Fisch E A, White G B. Secure computers and networks-analysis, design and implementation[M].New York:CRC Press,2000.
  • 3[3]Stallings W. Network and internetwork security: principles and practice[M].New York:Prentice-Hall Inc,1996.
  • 4[4]Touch J D.Performance analysis of MD5 [J].ACM Computer Communication Review,1995,25(4):77~86.
  • 5[5]Bellare M, Canetti R, Krawczyk H. Keying Hash functions for message authentication[A].Lecture Notes in Computer Science: Advances in Crytology-CRYPTO'96 [C].Berlin:Springer,1996.1~15.
  • 6[6]Preneel B,Van O. MD-x MAC and building fast MACs from Hash functions [A]. Lecture Notes in Computer Science : Advances in Cryptology-CRYPTO'95 [C].Berlin : Springer,1995.53~56.

同被引文献17

  • 1于增贵.网络安全与加密方案[J].四川通信技术,1996,26(5):1-3. 被引量:4
  • 2Touch J D.Performance analysis of MDS[J].ACM Computer Communication Review, 1995 ; 25 (4) : 77-86.
  • 3Bellare M,Canetti R,Krawczyk H.Keying Hash functions for message authentication[C].In :Lecture Notes in Computer Science:Advances in Crytology- CRYPTO' 96, Berlin: Springer, 1996:1 - 15.
  • 4Preneel B,Van O.MD2x MAC and building fast MACs from Hash functions[C].In:Lecture Notes in Computer Science:Advances in Cryp-tology-CRYPTO ' 95, Berlin: Springer, 1995 : 53-56.
  • 5Computer Emergency Response Team. Manage Logging and Other Data Collection Mechanisms[EB/OL].http//www.cert.org/security improvement/practices/p092.html,2001-05-01.
  • 6[10]Richard Murphy,L. Syslog and Netsaint:How to Integrate Centralized Logging with Centralized Monitoring.http//www. sans.org/infosecFAQ/security/logging.htm,2001-7-27.
  • 7Kenneth E. Nawyn,L. A Security Analysis of System Event Logging with Syslog. www.sans.org/infosecFAQ/securitybasics,2003-05-28.
  • 8http://www.microsoft. com/windows2000/library/planning/security
  • 9盛焕烨,王珏.网络安全攻防对策综述[J].上海交通大学学报,1997,31(8):82-87. 被引量:7
  • 10文远保,吴少鸿.Intranet 安全与防火墙技术研究[J].华中理工大学学报,1998,26(6):107-109. 被引量:1

引证文献5

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部