期刊文献+

互联网可信身份体系思考——从身份管理到身份服务 被引量:4

The Research on Trusted Identity System on the Internet——from identity management to identity service
下载PDF
导出
摘要 本文通过分析"网络空间可信身份"的研究背景、研究意义及研究价值,以及国内外网络空间可信身份体系的建设思路、建设现状和存在的问题,针对互联网这一最为活跃的网络域,分析提出了我国互联网可信身份体系模型、体系架构以及可信身份管理平台的定位和能力,最终提出了我国互联网可信身份建设的推进思路,为支撑我国构建身份可信、行为可溯、监管可达的国家网络空间可信身份体系提供理论支撑,满足我国"国家可信身份战略"的核心诉求。 In this paper, we firstly analyzed the research background, research significance and research value of Cyberspace trusted identity, and then we studied the building roadmap, the current state and existing problem. Through the above research, we focus the most active network field, the internet, to introduce our model and architecture for chinese internet trusted identity system. In this system, we proposed a trusted identity management platform to support the identity management and service on the internet. Finally we suggested a building roadmap for the construction of Chinese internet identity system. By this research, we hope to show a theoretical support to the construction of Chinese Cyberspace Trusted Identity System with credibility tracebility and acoutability, in order to satisfy the core appeal of "Chinese trusted identity strategy".
作者 江东兴 侯建宁 韩斐 唐鸣 JIANG Dong-xing;HOU Jian-ning;HAN Fei;TANG Ming(Westone Information Industry Inc,Beijing 100070,China)
出处 《信息安全与通信保密》 2018年第5期102-109,共8页 Information Security and Communications Privacy
关键词 可信身份 网络空间 网络信任 体系 信息安全 trusted identity Cyberspace internet truse system information security
  • 相关文献

参考文献1

二级参考文献6

  • 1王功明,关永,赵春江,吴华瑞.可信网络框架及研究[J].计算机工程与设计,2007,28(5):1016-1019. 被引量:10
  • 2The White House. National Strategy for Trusted Identities in Cyberspace[OL].http://www.whitehouse.gov,2011.
  • 3Howard A.Schmidt. The National Strategy for Trusted Identities in Cyberspace and Your Privacy[OL].http://www.whitehouse.gov,2011.
  • 4Howard A.Schmidt. Advancing the National Strategy for Trusted Identities in Cyberspace:Government as Early Adopter[OL].http://www.whitehouse.gov,2011.
  • 5陈剑勇,吴桂华.身份管理技术及其发展趋势[J].电信科学,2009,25(2):35-41. 被引量:7
  • 6魏亮.身份管理(IDM)策略思考[J].电信网技术,2009(3):36-39. 被引量:5

共引文献6

同被引文献23

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部