期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
1
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 Cross-domain authentication blockchain smart parks Certificate Authority(ca) distributed collaboration Internet of Things(IoT)
下载PDF
基于桥CA的高兼容性分布式信任模型 被引量:9
2
作者 朱鹏飞 戴英侠 鲍旭华 《软件学报》 EI CSCD 北大核心 2006年第8期1818-1823,共6页
基于PKI(public-keyinfrastructure)的分布式信任模型能够更好地保证分布式系统的安全性.作为信任路径的载体,数字证书格式的差异性可能对不同信任域实体之间的信任路径的可用性产生影响.提出了证书格式兼容性的概念,并以此为基础分析... 基于PKI(public-keyinfrastructure)的分布式信任模型能够更好地保证分布式系统的安全性.作为信任路径的载体,数字证书格式的差异性可能对不同信任域实体之间的信任路径的可用性产生影响.提出了证书格式兼容性的概念,并以此为基础分析了证书格式差异对证书有效性验证的作用方式.在桥CA(certificateauthority)的基础上,提出一种兼容性较高的分布式结构的信任模型,能够消除证书格式兼容性问题对不同信任域实体之间实现互连的干扰. 展开更多
关键词 证书格式 兼容性 ca(certificate authority)
下载PDF
面向海洋信息管理的轻量级CA的设计与实现 被引量:3
3
作者 丁明 周林 +4 位作者 韩京云 宋庆磊 宋转玲 李新放 刘海行 《海洋科学》 CAS CSCD 北大核心 2014年第2期91-95,共5页
面向海洋信息管理的需求,基于J2EE平台,使用Bouncy Castle提供的加密算法与工具,遵从PKI(Public Key Infrastructure,公钥基础设施)相关标准,实现了一个适用于中小型海洋信息管理系统的轻量级数字证书认证机构(CA,Certificate Authority... 面向海洋信息管理的需求,基于J2EE平台,使用Bouncy Castle提供的加密算法与工具,遵从PKI(Public Key Infrastructure,公钥基础设施)相关标准,实现了一个适用于中小型海洋信息管理系统的轻量级数字证书认证机构(CA,Certificate Authority)。该CA提供了适用于中小型海洋信息管理系统的数据存储与传输加密功能,为通过网络实现高效的海洋科研数据收集与共享管理提供了技术上的安全保障。 展开更多
关键词 海洋信息安全 海洋信息管理 Bouncy caSTLE 数字证书认证机构(ca Certificate Authority) 加密
下载PDF
TWO-STEP MOBILE AGENT BASED AUTHENTICATION ARCHITECTURE:TOWARDS EFFECTIVE GRID AUTHENTICATION
4
作者 王海艳 王汝传 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期61-66,共6页
The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the... The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the same importance in the application of grid technology. As a critical component of grid security, the secure authen- tication needs to be well studied. In this paper, a two-step mobile agent based(TSMAB) authentication architecture is proposed based on Globus security infrastructure (GSI). By using mobile agent (MA) technology, the TSMAB authentication architecture is composed of the junior-authentication and the senior-authentication. Based on the design and the analysis of TSMAB model, the result shows that the efficiency of grid authentication is improved compared with the GSI authentication. 展开更多
关键词 AUTHENTIcaTION ARCHITECTURE GRID certificate authority(ca
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
5
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(ca) CLUSTERING threshold optimization
下载PDF
PROFESSOR HUANG BINGERI,THE ACADEMICIAN OF CAS,WON THE SPECIAL HONORARY CERTIFICATE ISSUED BY IGU
6
《Journal of Geographical Sciences》 SCIE CSCD 1997年第4期109-110,共2页
关键词 PROFESSOR HUANG BINGERI THE AcaDEMICIAN OF caS WON THE SPECIAL HONORARY CERTIFIcaTE ISSUED BY IGU caS
下载PDF
一种用于移动IPv6的混合认证方法 被引量:12
7
作者 陈炜 龙翔 高小鹏 《软件学报》 EI CSCD 北大核心 2005年第9期1617-1624,共8页
随着移动通信的快速发展,通信实体的身份认证日益成为研究人员面临的巨大挑战.在IETF(Internetengineeringtaskforce)的移动IPv6草案中,IPSec(IPsecurity)协议和RR(returnroutability)机制被用于保护相关通信节点之间的通信信令,但解决... 随着移动通信的快速发展,通信实体的身份认证日益成为研究人员面临的巨大挑战.在IETF(Internetengineeringtaskforce)的移动IPv6草案中,IPSec(IPsecurity)协议和RR(returnroutability)机制被用于保护相关通信节点之间的通信信令,但解决通信实体身份认证问题的方法存在一定的不足.首先分析了基于证书和基于身份的认证技术的优点和不足.基于证书的认证方法有很好的可扩展性,但PKI(publickeyinfrastructure)的部署和证书的分发代价较高.反之,由于相关节点需要共享一组系统参数,基于身份的认证方法可扩展性差,但克服了基于证书的认证方法的不足.然后,提出一种同时使用上述两种认证方法的混合认证方法.该混合认证方法为实现安全、快速、低成本和可扩展性好的身份认证提供了一种新的思路.最后,将这种混合技术用于改进移动IPv6安全关联的协商过程,并讨论了该技术的安全性. 展开更多
关键词 移动IPV6 IPSec(IP security) ca(certificate authority) PKI(public key infrastructure) 基于身份的密码学
下载PDF
SSL协议实现与PKI体系的支持 被引量:10
8
作者 于瑞华 《中国人民公安大学学报(自然科学版)》 2004年第1期55-58,共4页
安全套接字层 (SSL)协议是一个网络安全通信协议 ,数字证书是应用SSL协议进行认证和加密的先决条件 ,证书的签发和管理需要由机构完成。本文简单介绍了SSL协议及实现方法 ,提出了CA机构的模式。
关键词 SSL(Secure SOCKETS Layer)协议 数议 数字证书ca(Certificate Authority)
下载PDF
肺功能检查信息化管理系统的建设 被引量:2
9
作者 杨银双 孙培莉 +1 位作者 殷悦楚楚 郭建军 《电子技术与软件工程》 2021年第13期171-172,共2页
本文为了提升患者就诊体验,减少医生在检查过程中因手动输入信息导致的错误,同时为了挖掘宝贵的肺功能数据科研价值,构建肺功能信息化管理系统。该系统按照电子病历系统应用水平分级评价的要求对医嘱状态、检查报告进行流程闭环管理,通... 本文为了提升患者就诊体验,减少医生在检查过程中因手动输入信息导致的错误,同时为了挖掘宝贵的肺功能数据科研价值,构建肺功能信息化管理系统。该系统按照电子病历系统应用水平分级评价的要求对医嘱状态、检查报告进行流程闭环管理,通过对接大数据应用中心,将检查数据和报告集中存储,实现检查过程全流程化管理,检查结果全院共享。 展开更多
关键词 ca(certificate authority) 医嘱闭环管理
下载PDF
中核运行公司文件服务器的设计
10
作者 王军 《计算机光盘软件与应用》 2014年第1期46-48,共3页
文章描述了中核运行公司内部的文件服务器构建方法,通过微软Windows Server 2008的故障转移群集技术,来部署文件服务器。在设计高可用性时,需要在存储、网络、操作系统及应用多个角度进行考虑。使用FSRM(文件服务器自愿管理)对保存的文... 文章描述了中核运行公司内部的文件服务器构建方法,通过微软Windows Server 2008的故障转移群集技术,来部署文件服务器。在设计高可用性时,需要在存储、网络、操作系统及应用多个角度进行考虑。使用FSRM(文件服务器自愿管理)对保存的文件类型和配额进行限制,配合详细的NTFS权限设计能做到精细的权限控制和利用FSA(文件系统审计)对文件服务器的操作进行审计,能够满足一般中大型企业的日常使用。对于跨区域大型企业,DFS技术将Windows文件服务器可以作为集团化企业的ECM的一种补充。 展开更多
关键词 文件服务器 SAN(Storage Area Network) 群集(Cluster) 重复删除 文件服务器资源管理器(FSRM) ca(Certificate Authority)
下载PDF
Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme
11
作者 黄悦民 林华乙 王宗一 《Journal of Computer Science & Technology》 SCIE EI CSCD 2006年第6期997-1011,共15页
Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobilit... Dissimilar to traditional networks, the features of mobile wireless devices that can actively form a network without any infrastructure mean that mobile ad hoc networks frequently display partition due to node mobility or link failures. These indicate that an ad hoc network is difficult to provide ou-llne access to a trusted authority server. Therefore, applying traditional Public Key Infrastructure (PKI) security framework to mobile ad hoc networks will cause insecurities. This study proposes a scalable and elastic key management scheme integrated into Cluster Based Secure Routing Protocol (CBSRP) to enhance security and non-repudiation of routing authentication, and introduces an ID-Based internal routing authentication scheme to enhance the routing performance in an internal cluster. Additionally, a method of performing routing authentication between internal and external clusters, as well as inter-cluster routing authentication, is developed. The proposed cluster-based key management scheme distributes trust to an aggregation of cluster heads using a threshold scheme faculty, provides Certificate Authority (CA) with a fault tolerance mechanism to prevent a single point of compromise or failure, and saves CA large repositories from maintaining member certificates, making ad hoc networks robust to malicious behaviors and suitable for numerous mobile devices. 展开更多
关键词 ad hoc network PKI CBSRP ID-BASED inter-cluster cluster-based ca (Certificate Authority)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部