期刊文献+

电子政务安全建设中的访问控制研究 被引量:5

Research on Access Control in E-Government Secure Construction
下载PDF
导出
摘要 针对电子政务安全建设过程中的访问控制问题,在重点介绍X.509V4(2000)版属性证书的基础上,提出了一个基于公钥证书身份认证和基于属性证书授权访问的双证书访控模型,并对其进行了分析。 Considering the significance of access control in EGovernment Secure construction,this paper emphatically introduces the concept and characteristic of X.509 attribute certificate,and comes up with a PKCbased and ACbased dual certificate model to solve access control problem of the EGovernment construction,whose performance is also analyzed.
出处 《计算机应用》 CSCD 北大核心 2003年第7期83-85,共3页 journal of Computer Applications
关键词 属性证书 公钥证书 访问控制 电子政务 attribute certificate public-key certificate access control E-Government
  • 相关文献

参考文献7

  • 1谭寒生 张舰 等.PNI与PKI模型关系研究[J].计算机应用,2002,22(8):86-88.
  • 2谭强,黄蕾.PMI原理及实现初探[J].计算机工程,2002,28(8):187-189. 被引量:24
  • 3北京市人事局.信息技术与电子政务[M].北京:清华大学出版社,2001..
  • 4许剑勇,邵世煌,蒲芳.基于安全的电子公文交换系统[J].计算机应用,2003,23(1):97-99. 被引量:4
  • 5ITU - T Recommendation X. 5 0 9. ISO/IEC95 94 - 8 Information Technology-Open System Intereonneetion-The Directory: Public Key and Attribute Certificate Frameworks[ Z], 2001.
  • 6Farrell S, Housley R. An Internet Attribute Certificate Profile for Authorization[S]. RFC 3281, IETF, 2002.
  • 7ITU-T Rec. X. 509 ISO/IEC 9594 - 8 The Directory: Authentication Framework[ Z], 2000.

二级参考文献7

  • 1..深圳经济特区行政机关电子公文交换技术规范[S].深圳市质量技术监督局,2002..
  • 2[1]ITU-T Recommendation X.509.Information Technology-Open System Interconnection- The Directory:Public Key and Attribute Certificate Framework.2000
  • 3[2]Oppliger R,Permul G,Strauss C.Using Attribute Certificates to Imple-ment Role-based Authorization and Access Controls.http:∥www.entrust, com
  • 4[3]Entrust XML Strategy for Authorization. http:∥www.entrust.com
  • 5[4]ISO 1018 1-3.1nformation Technology - Open Systems Interconnection Security frameworks for Open System:Access Control Framework.
  • 6[5]Boeyen S.X.509 (2000):4th Edition:Overview of PKI & PMI Frame-works.http:∥www.entrust.com
  • 7冯登国 周永彬 张振峰 等.密码工程实践指南[M].清华大学出版社,2001.80-83.

共引文献26

同被引文献29

  • 1吴立军,苏开乐.基于角色PMI的电子政务安全模型[J].计算机工程与应用,2004,40(31):117-119. 被引量:6
  • 2王彦,孙鹏,吕述望.一种企业机密文档分发机制[J].计算机工程,2004,30(22):27-29. 被引量:6
  • 3许钟,王小兵,黄勇,曹莉.结合指纹识别的电子印章系统的研究[J].计算机工程与科学,2006,28(1):41-44. 被引量:2
  • 4赵亚男,杨群.用物理-事理-人理的方法研究运输安全系统[J].中国安全科学学报,2001,11(5):58-61.
  • 5[13]Hammer M,Champy J.Reengineering the Corporation:A Manifes of or Business Revolution [M].New York:HarperCollins
  • 6[14]Andreas Margelisch,Ulrixh Reimer,Martin Stardudtetal.Cooperative Support for Office Work in the Insurance Business [C].In:CoopIS'99Proceedings,1999IFCISInternationalConferenceon
  • 7[17]jifa Gu.WSR Approach to Evaluation Support for Commercial Integration System,Proceedings of APORS ' 2000:Operations Research in the Millennium,Singapore
  • 8[2]Stowers G N L.Moving governments on line:implementation and policy issues.Public Administration Review
  • 9中科院中国电子政务研究室.电子政务工程建设初探[J].中国计算机报,2002,(1).
  • 10[7]Gu J F,Zhu Z C.The Wu -li Shi -li Ren - li Approach (WSR):an Oriental Methodology,in Systems Methodology:Possibilityies for cross - cultural Learning and Integration (G.Midgley and J.Wilby eds.),The University of Hull Press,United Kingdom

引证文献5

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部