期刊文献+

主动网络安全机制研究 被引量:6

Research on the Security Mechanism of Active Network
原文传递
导出
摘要 主动网络的安全性包括对主动分组和主动节点的保护,对主动节点的保护是在通过认证的基础上,参考策略库对不同的分组授予不同的节点资源访问权限来实现。主动分组在传输过程中的代码的可靠性和完整性可以通过加密和数字签名加以保证,而在主动节点上的安全性主要通过节点和分组的双向认证及接口的严格定义,分组间的隔离及对分组的必要限制等来实现。 Compared with the traditional network, the security of Active Network includes both the active packet and active node. In order to protect the active node, the principal need showld be authenticated first, then it can be given different access rights for different packets based on policy database. Encryption and digital signatures can insure the reliability and integrity of active code in the process of transmission. And the security of packet in the node can be realized by using the authorization of both node and packet and the precision definitions of interface, the separation of packets and the restrictions for packets,etc.
作者 吴明华
出处 《重庆师范学院学报(自然科学版)》 2003年第3期19-22,共4页 Journal of Chongqing Normal University(Natural Science Edition)
基金 重庆市教委2002年度应用基础研究项目资助 项目号020805。
关键词 主动网络 网络安全 主动分组 主动节点 访问权限 数字签名 加密 安全机制 authentication authorization policy enforcement engine security of active code
  • 相关文献

参考文献9

  • 1李鸿培,王新梅.主动网络节点的安全机制研究[J].计算机科学,2001,28(3):46-49. 被引量:5
  • 2夏正友,张世永.主动网络安全结构模型设计(英文)[J].软件学报,2002,13(8):1352-1360. 被引量:9
  • 3王建国,李增智,王宇,寇雅楠.通用的主动网络安全机制[J].西安交通大学学报,2002,36(8):818-821. 被引量:10
  • 4CALVER K L. Architecture Framework for Active Network[DB/OL]. http://www. dcs. uky. edu/~calvert/arch-docs.html,1999-07.
  • 5MURPHY S,LEWIS E,PUGA R,et al. Strong Security for Active Networks [J/OL]. IEEE OPENARCH. http://comet. ctr.columbia. edu/activities/openarch2001/papers2001/OA_06.PDF,2001.
  • 6AN Security Working Group. Security Architecture for Active Nets[ EB/OL]. http://protocols. netlab. uky. edu /~calvert/sec-latest.ps,2001-11.
  • 7AN Security Working Group, Modified by Seraphim Group. Security Architecture for Active Nets[ EB/OL]http://choices.cs. uiuc. edu/Security/seraphim/may2000/securityarchitecture.pdf,1998-11/2000-05.
  • 8AN NodeOS Working Group. NodeOS Interface Specification[ EB/OL]. http ://www.ecs. umass. edu/ece/wolf/ courses/ECE697J/papers/AN_node_OS.pdf ,2001-01.
  • 9PANKAJ Kakkar. The Specification of PLAN [ EB/OL]. http://www.cis. upenn, edu/~switchware/PLAN/spec/spec.ps,1999-07.

二级参考文献34

  • 1[1]Tennenhouse D L,et al. A Survey of Active Network Research. IEEE Communicatioins Magazine, 1997 (Jan.): 80~86
  • 2[2]Smith J M, et al. Activating Networks: A Progress Report. IEEE Computer, 1999(April): 32~41
  • 3[3]Moore J T. Mobile Code Security Techniques. Available at: http://www. dsl. cis. upenn. edu/~jonm.
  • 4[4]Greenberg M S,et al. Mobile Agents and Security. IEEE Communications Magazine, 1998(July): 76~85
  • 5[5]Hicks M,et al. A Secure Plan. Available at: www. cis. upenn. edu/~switchware/papers/
  • 6[6]Alexander D S,et al. A Secure Active Network Environment Architecture: Realization in SwitchWare. IEEE Network,1998. 37~45
  • 7[7]Alexander DS,Arbangh W A,et al. Safety and Security of Programmable Network Infrastructures. IEEE Communications Magazine, 1998 (Oct.): 84~92
  • 8[8]Marlkhi D,Reiter M K,Rubin A D. Secure Execution of Java Applets Using a Remote Playground. In:Proc. of the 1998 IEEE Symposium on Security and Privacy. Oakland,California,May 1998
  • 9[9]Denning D E. An intrusion detection model. IEEE Trans.On Software Engineering, 1987,13, (2): 222~232
  • 10[1]Tennenhouse, D., Wetherall, D. Towards an active network architecture. In: Proceedings of the Multimedia Computing and Networking 1996. San Jose, CA, 1996.

共引文献20

同被引文献31

  • 1周恒琳,李增智.主动网络信包验证和代码授权机制研究[J].微电子学与计算机,2004,21(7):112-116. 被引量:3
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3李雅红,王建国,潘晓雁.一种新的主动节点资源访问控制策略[J].微电子学与计算机,2005,22(12):120-122. 被引量:2
  • 4谭晓荣,程小平.数字签名及其在音乐专业考试网上评分系统中的应用[J].西南师范大学学报(自然科学版),2006,31(4):121-124. 被引量:3
  • 5Sire J. A simulation and emulation environment for wireless sensor networks [EB/OL]. [2007- 12- 19]. http:// www. j-sim. org/v1. 3/sensor/JSim. pdf.
  • 6ACA: The autonomous component architecture[ EB/OL ]. [2007 - 12 - 17 ]. http://www. j-sim.org/whitepapers/ aca. html.
  • 7Shamir A. Identity-Based Cryptosystems and Signature Schemes [C]//Advances in Cryptology-CRYPTO'84. Berlin: Springer-Verlag, 1984: 47 -- 53.
  • 8Chen X, Zhang F, Kim K. A New Id-Based Group Signture Scheme From Bilinear Pairings [EB/OL]. (2003 --08 --06) [2007 -- 12 -- 01]. http: //eprint. iacr. org/2003/116.
  • 9Yoon H J, Cheon J H, Kim Y. Batch Verifications with ID-Based Signatures[C] //Information Security and Cryptology-ICISC 2004. Berlin: Springer-Verlag, 2005: 233- 248.
  • 10Hess F. Efficient Identity Based Signature Schemes Based on Pairings[C] //Selected Areas in Cryptography. Berlin: Springer-Verlag, 2003 : 310 -- 324.

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部