期刊文献+

云KEY技术在电力行业移动互联网环境中的应用 被引量:3

Application of Cloud KEY Technology in Mobile Internet Environment of Power Industry
下载PDF
导出
摘要 随着互联网与移动技术的不断发展,一个创新无限、活力无限的移动互联网新世界就此诞生。智能终端的普及使得台式机、笔记本电脑与移动终端的界限越来越模糊,许多以前只能在台式机或笔记本实现的功能已经越来越多地可以在智能移动终端上实现。身份认证技术作为保证移动互联网应用的第一道安全屏障,具有至关重要的作用。传统的认证技术在移动互联网应用环境存在安全风险和局限性,而云KEY技术可以为电力行业移动互联网应用的身份认证、数字签名、抗抵赖等业务提供安全保障。 With continuous development of the Internet and mobile technology, a new world of mobile Internet with unlimited innovation and vitality is born. The popularity of smart terminals increasingly blurs the boundaries of between desktops, laptops and mobile devices, and many of the functions previously only available on desktops or laptops can be implemented on smart mobile devices. Identity authentication technology as the first security barrier to secure mobile Internet applications plays a crucial role, and the traditional authentication technology has security risks and limitations in the mobile Internet application environment. However, the cloud KEY technology could provide security for the identity authentication, digital signature, and non-repudiation of mobile Internet applications in the power industry.
作者 臧笑宇 黄锋涛 陈守明 翁睿琳 ZANG Xiao-yu;HUANG Feng-tao;CHEN Shou-ming;WENG Rui-lin(Information Center of Guangdong Power Grid Co.,Ltd.,Guangzhou Guangdong 510000,China)
出处 《通信技术》 2018年第10期2488-2493,共6页 Communications Technology
关键词 UKEY APP 加密机 云KEY UKEY APP encryptor cloud KEY
  • 相关文献

参考文献4

二级参考文献19

  • 1冯登国(译),公开密钥基础设施,2001年
  • 2吴世忠(译),应用秘码学协议、算法与C源程序,2000年
  • 3JessGarms DanielSomerfield.Professional JAVA Security[M].北京:电子工业出版社,2002..
  • 4MohanAtreya 等.数字签名[M].北京:清华大学出版社,2003..
  • 5杨明 谢希仁.密码编码学与网络安全,原理与实践(第二版)[M].北京:电子工业出版社,2001..
  • 6AndrewNash WillianDuane etal.PKI:Implementing and Managing E-Security[M].北京:清华大学出版社,2002..
  • 7David Barrera. A methodology for empirical analysis of permission based security models and its application on to Andrnid [J/OL].SchI of computer Science, Carleton university Ottawa, Canada. http://citeseerx.ist. psu.edu/vicwd/summary doi= 10.1.1.170.1674.
  • 8Hacknet.Android操作系统安会研究[EB/OL]http://bbs.pediy.com/showthread.phpt=136517,2011-07-04.
  • 9PATRICIA M M,DONNA H. Business risks and security assessment for mobile devices[J].Information Systems Control Journal,2008( 1 ):1-6.
  • 10魏亮.移动互联网安全框架[J].中兴通讯科技,2009.

共引文献68

同被引文献26

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部