期刊文献+

利用SPKI委托证书实现分布式访问控制 被引量:2

Distributed Access Control Using SPKI Delegation Certificates
下载PDF
导出
摘要 传统的访问控制技术已经无法满足大规模、跨域范围分布式应用的安全需要。本文从分析简单公钥基础设施 (SPKI)委托证书满足分布式访问控制的几个基本特征出发 ,描述了证书的结构和五元组压缩规则 ,给出了采用委托证书的访问控制实现模型 。 Traditional access control technologies can not meet the security requirement of large scale distributed application. Based on the characteristics of SPKI delegation certificate,which also meet the requirement of distributed access control,this paper describes the format of delegation certificate and the rules of 5-tuple reduction,gives out the implementation model,and briefly discusses the algorithm of certificate chains decision.
出处 《电讯技术》 北大核心 2002年第1期35-38,共4页 Telecommunication Engineering
关键词 计算机网络安全 公开密钥基础设施 委托证书 访问控制 Computer network security Public key infrastructure Delegation certificate Access control Model
  • 相关文献

参考文献3

  • 1[1]Carl Ellison, et al. SPKI Certificate Theory[C], RFC2693, September 1999.
  • 2[2]Thomas Aura, On the Structure of Delegation Networks[C], In proc. 11th IEEE Computer Security Foundations Workshop, June 1998,pages 14~26.
  • 3[3]Thomas Aura, Fast Access Control Decisions from Delegation Certificate Databases[C], In proc. 3rd Australasian Conference on Information Security and Privacy ACISP'98, volume 1438 of LNCS, July 1998,pages 284~295.

同被引文献8

  • 1Ravi Sandhu. Role-based access control models. IEEE Comput , 1996,29(2): 38--47.
  • 2羽田知史.SOAP安全性扩展:数字签名[EB/OL].http://safe.jz173.com/20040809/20040809163302-2.html.
  • 3Dwaine Clarke,Jean-Emile Elien.Certificate chain discovery in SPKI/SDSI[J].Journal of Computer Security,2001,9(4):285-322.
  • 4IBM 和微软公司.Web服务安全性(WS-Security)[EB/OL].http://www-128.ibm.com/developerworks/cn/webservices/wssecure/.
  • 5IBM和微软公司.Web服务提议的体系架构和指南[EB/OL].http://vision.pku.edu.cn/yan2/zyzl/zyzl-sls/HTML/Web%20Security.htm.
  • 6Maryann Hondo,等.Web服务安全性:发展协议栈[EB/OL].http://indus try.ccidnet.com/pub/article/c1139-a45530-p1.html.
  • 7James Snell.保护 Web 服务[EB/OL].http://home.donews.com/donews/article/ 4/41956.html.
  • 8谭强,黄蕾.PMI原理及实现初探[J].计算机工程,2002,28(8):187-189. 被引量:24

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部