期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Web应用中单点登录系统体系结构研究 被引量:3
1
作者 付继华 《计算机时代》 2007年第4期23-24,共2页
随着Web的广泛应用,为了加强系统安全和简化管理,需要一个安全和基于标准的规范机制来实现跨安全域的身份认证信息交换以确保用户仅登录一次,便可以享用安全域中提供的服务。文章分析了Web应用环境下两种单点登录体系结构,并分别说明了... 随着Web的广泛应用,为了加强系统安全和简化管理,需要一个安全和基于标准的规范机制来实现跨安全域的身份认证信息交换以确保用户仅登录一次,便可以享用安全域中提供的服务。文章分析了Web应用环境下两种单点登录体系结构,并分别说明了它们的实现流程。最后对它们作了一些比较。 展开更多
关键词 单点登录 体系结构 WEB应用 认证体系结构
下载PDF
CA认证系统在统计局中的应用
2
作者 裴超英 逄丽敏 《信息技术》 2003年第2期50-52,共3页
CA认证系统用于数字证书的申请、审核、签发、注销、更新、查询的综合管理系统。通过CA认证中心发行的电子证书可以为用户提供信息安全的全面服务。CA认证系统拥有高强度的加密算法 ,高可靠性的安全机制及完善的管理及配置策略 ,提供自... CA认证系统用于数字证书的申请、审核、签发、注销、更新、查询的综合管理系统。通过CA认证中心发行的电子证书可以为用户提供信息安全的全面服务。CA认证系统拥有高强度的加密算法 ,高可靠性的安全机制及完善的管理及配置策略 ,提供自动的密钥和证书管理服务。 展开更多
关键词 CA认证系统 统计局 电子证书 认证体系结构
下载PDF
TWO-STEP MOBILE AGENT BASED AUTHENTICATION ARCHITECTURE:TOWARDS EFFECTIVE GRID AUTHENTICATION
3
作者 王海艳 王汝传 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期61-66,共6页
The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the... The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the same importance in the application of grid technology. As a critical component of grid security, the secure authen- tication needs to be well studied. In this paper, a two-step mobile agent based(TSMAB) authentication architecture is proposed based on Globus security infrastructure (GSI). By using mobile agent (MA) technology, the TSMAB authentication architecture is composed of the junior-authentication and the senior-authentication. Based on the design and the analysis of TSMAB model, the result shows that the efficiency of grid authentication is improved compared with the GSI authentication. 展开更多
关键词 AUTHENTICATION ARCHITECTURE GRID certificate authority(CA)
下载PDF
Cryptanalysis of Two Dynamic Identity Based Authentication Schemes for Multi-Server Architecture
4
作者 WAN Tao JIANG Nan MA Jianfeng 《China Communications》 SCIE CSCD 2014年第11期125-134,共10页
Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trad... Since network services are provided cooperatively by multiple servers in the lnternet, the authentication protocols for multiserver architecture are required by Internetbased services, such as online game, online trade and so on. Recently, Li et al. analyzed Lee et al.'s protocol and proposed an improved dynamic identity based authentication protocol for multi-server architecture. They claimed that their protocol provides user's anonymity, mutual authentication and the session key agreement against several kinds of attacks. In this paper, a cryptanalysis on Lee et al.'s scheme shows that Lee et al's protocol is also vulnerable to malicious server attack, stolen smart card attack and leak-of-verifier attack. Moreover, Li e/ al.'s improved protocol is also vulnerable to all these attacks. Further cryptanalysis reveals that Li et al.'s improved protocol is susceptible to collusion attack. 展开更多
关键词 AUTHENTICATION MULTI-SERVER smart card ANONYMITY Dynamic ID
下载PDF
Personal Delegation by Persona Creation
5
作者 Coimbatore S. Chandersekaran William R. Simpson 《Computer Technology and Application》 2011年第6期413-423,共11页
There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability ... There are many business needs for implementing delegation in IT (Information Technology) systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g., by sharing credentials [passwords or hardware tokens] between users), resulting in serious security concerns and a lack of accountability. This paper describes a methodology for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it, This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by a major enterprise. The creation of a persona solves a lot of downstream problems by allowing the persona to be treated like any other entity in the system. That is, identity, authentication, authorization, and other security processes already know how to handle an entity of this type. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required. 展开更多
关键词 DELEGATION enterprise information security least privilege ATTRIBUTION information sharing
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部