期刊文献+

PKI体系下的地图按需出版CA模型研究

Research on CA Model for Map On-Demand Publishing under PKI System
下载PDF
导出
摘要 针对传统地图出版流程中所存在的问题,本研究提出地图按需出版机制,并为保证地图按需出版的数据安全,结合公钥基础设施(PKI)体系,将地图按需出版体系划分为多个信任域,根据每个信任域的组织结构特点,设计了与之相对应的域内认证中心(CA)模型,同时根据地图按需出版各个角色业务逻辑关系,设计了地图按需出版串桥CA模型,完成了对整个地图按需出版机制总体CA模型的构建,同时分析了模型的安全性与灵活性。本研究提出的模型为地图按需出版安全机制的实施提供了一定的参考。 Aiming at the problems in existing map publishing workflow, the map on-demand publishing mechanism was put forward in this study. In order to guarantee the data safety during map on-demand publishing, combined with the Public Key Infrastructure (PKI) system, the map on-demand publishing system was divided into multiple trust domains. According to the characteristics of the organizational structure of each trust domains, the corresponding domain CA model was designed. According to the business logic relationship of the roles of map on-demand publishing, the string bridge CA model was designed and the CA model for overall map on-demand publishing mechanism was completely setted up. At the same time, its security and scalability were analyzed. The model will provide the references for the implementation of the security mechanism of map on-demand publishing.
出处 《中国印刷与包装研究》 CAS 2014年第1期35-39,共5页 China Printing Materials Market
关键词 地图按需出版 公钥基础设施 安全策略 桥认证中心模型 Map on-demand publishing Public Key Infrastructure Security policy Bridge certification authority model
  • 相关文献

参考文献8

  • 1刘真,史瑞芝,魏斌,等.数字印前原理与技术[M].北京:解放军出版社,2003.184-191.
  • 2梁威.新解“按需”与“出版”——按需出版的发展要攻克需求与技术瓶颈[J].出版广角,2012(8):48-49. 被引量:2
  • 3KAUFMANCharlie,PERLMARadia,SPECINERMike.网络安全--公共世界中的秘密通信[M].2版.许剑卓,左英男,等,译.北京:电F工业出版社,2004:238-239.
  • 4谢冬青 冷健.PKI原理与技术[M].北京:清华大学出版社,2003,12..
  • 5李鹏,张昌宏,周立兵.基于交叉认证的PKI信任模型研究[J].计算机与数字工程,2010,38(12):100-103. 被引量:3
  • 6HAIDAR A N, ABDALLAH A E. Formal Modelling of PKI Based Authentication [J]. Electronic Notes in Theo- retical Computer Science, 2009, 235:55 -70.
  • 7ALTERMAN Peter. The U. S. Federal PKI and the Feder- al Bridge Certification Federal Bridge Certification Au- thority [J]. Computer Networks, 2001, 36 ( 6 ) : 685 -690.
  • 8张帆,顾青,荆继武,林璟锵,査达仁.PKI系统的应用互操作评估[J].中国科学院研究生院学报,2010,27(6):824-830. 被引量:1

二级参考文献19

  • 1白贞武.基于PKI/CA的交叉认证研究[J].中国科技信息,2005(16A):58-58. 被引量:4
  • 2刘焯琛,李羚颖.PKI交叉认证及信任模型的研究[J].网络安全技术与应用,2007(1):29-31. 被引量:3
  • 3ITU - T. Recommendation X. 509 : Information technology - open systems intereonneetion - the directory : authentication framework [ S ]. 2005:08/05.
  • 4Cooper D, Santesson S, Farrell S W, et al. Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile [ S]. RFC5280. 2008 -05.
  • 5Myers M, Ankney A, Malpani A, et al. X. 509 intemet public ley onfrastructure online certificate status protocol[ S]. RFC 2560. 1999 - 06.
  • 6Chokhani S, Ford W, Sabett R. Intemet X. 509 public key infrastructure certificate policy and certification practices framework. RFC3647. 2003 : 11.
  • 7公钥密码系列标准[S/OL].http://www.rsa.com/rsalabs/node.asp.9id=2124.
  • 8Steven L. PKI interoperability framework [ S/OL]. [ 2010-02-20 ]. http ://www. pkiforum, org/pdfs/PKIInteroperabilityFramework, pdf.
  • 9Burr W, Dodson, Nazario N, et al. Minimum interoperability specification for PKI components, Version 1 [ S ]. NIST Special Publication, 1998.
  • 10冯登国,吴志刚,荆继武.PKI组件最小互操作规范[S].国家标准GB/T19771-2005.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部