期刊文献+

高校移动阅读中的用户识别与访问管理方案

User Recognition and Access Management Scheme in Mobile Reading in Colleges and Universities
下载PDF
导出
摘要 近几年商业移动阅读发展迅猛,高校移动阅读也逐渐跟上了时代的脚步.这也带来了一系列安全问题,传统的数字资源使用权限控制显然不适应移动阅读.因此提出了一种结合证书认证、加密等方法的符合高校图书馆行业特征的用户识别与访问管理方案. In recent years,commercial mobile reading has developed rapidly,and mobile reading in colleges and universities has gradually kept pace with the times.This also brings a series of security problems.The traditional access control of digital resources is obviously not suitable for mobile reading.Therefore,a user identification and access management scheme is proposed in this paper,which combines certificate authentication,encryption and other methods,and conforms to the characteristics of university library industry.
作者 刘玮瑶 LIU Wei-yao(Planning Finance Department,Xi'an University,Xi'an 710065,China)
出处 《西安文理学院学报(自然科学版)》 2019年第6期72-75,共4页 Journal of Xi’an University(Natural Science Edition)
关键词 移动阅读 身份认证 访问管理 mobile reading identity authentication access management
  • 相关文献

参考文献4

二级参考文献28

  • 1陈灿,李俊.Kerberos协议的形式化分析[J].微电子学与计算机,2006,23(6):49-51. 被引量:2
  • 2Jan De Clercq,臧铁军(译).Lonqhorn Server公共密钥基础结构[J].Windows IT Pro Magazine(国际中文版),2007(6):35-38. 被引量:1
  • 3[1]R.Housley, W.Ford, W.Polk, D.Solo, "Internet X.509 Public Key Infrastructure Certificate and CRL Profile", Intemet RFC-2459, July 1999.
  • 4[2]K.S.Narayan, "Cross Certification & Chained CA-A Brief", March 2001,U RL:http:∥www.sans.org/infosecFAQ/encryption/cross_cert.htm.
  • 5[3]Eyas A1-Hajery, "Trust Model in PGP and X.509 Standard PKI", April 2001, U RL:http:∥www.sans.org/infosecFAQ/encryption/trust_model.htm.
  • 6[4]Jim Turnbull, "Cross-Certification and PKI Policy Networking", August 2000, U RL:http:∥www.entrust,com/resourcecenter/pdf/cross_cer tification.pdf.
  • 7GELLINGS C W.The smart grid:enabling eenergy efficiency and demand response[M].Lilburn:Fairmont Press,2009.
  • 8FADLULLAH Z M,FOUDA M M,KATO N,et al.Toward intelligent machine-to-machine communications in smart grid[J].Communi-cat-ions Magazine,IEEE,2011,49(4):60-65.
  • 9MCLAUGHLIN S,PODKUIKO D,MCDANIEL P.Energy theft in the advanced metering infrastructure[C].4th International Workshop on Criti-cal Information Infrastructure Security.Berlin/Heidelberg:Springer-Verlag,2010:176-187.
  • 10KHURANA H,HADLEY M,LU N,et al.Smart-grid security issues[J].IEEE Security and Privacy,2010,8(1):81-85.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部