期刊文献+
共找到472篇文章
< 1 2 24 >
每页显示 20 50 100
Blockchain-Based Certificateless Cross-Domain Authentication Scheme in the Industrial Internet of Things
1
作者 Zhaobin Li Xiantao Liu +1 位作者 Nan Zhang Zhanzhen Wei 《Computers, Materials & Continua》 SCIE EI 2024年第9期3835-3854,共20页
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati... The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance. 展开更多
关键词 IIoT blockchain CERTIFICATELESS cross-domain authentication
下载PDF
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
2
作者 Feng Zhao Hongtao Ding +3 位作者 Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang 《Computers, Materials & Continua》 SCIE EI 2024年第7期567-585,共19页
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and varia... The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network.However,due to the open and variable nature of its network topology,vehicles frequently engage in cross-domain interactions.During such processes,directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers,thus compromising the security of the cross-domain authentication process.Additionally,IoV imposes high real-time requirements,and existing cross-domain authentication schemes for IoV often encounter efficiency issues.To mitigate these challenges,we propose CAIoV,a blockchain-based efficient cross-domain authentication scheme for IoV.This scheme comprehensively integrates technologies such as zero-knowledge proofs,smart contracts,and Merkle hash tree structures.It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security.Finally,we evaluate the performance of CAIoV.Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%,communication overhead by around 10%,and storage overhead by nearly 30%. 展开更多
关键词 Blockchain cross-domain authentication internet of vehicle zero-knowledge proof
下载PDF
A Post-Quantum Cross-Domain Authentication Scheme Based on Multi-Chain Architecture
3
作者 Yi-Bo Cao Xiu-Bo Chen +6 位作者 Yun-Feng He Lu-Xi Liu Yin-Mei Che Xiao Wang Ke Xiao Gang Xu Si-Yi Chen 《Computers, Materials & Continua》 SCIE EI 2024年第2期2813-2827,共15页
Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in differ... Due to the rapid advancements in network technology,blockchain is being employed for distributed data storage.In the Internet of Things(IoT)scenario,different participants manage multiple blockchains located in different trust domains,which has resulted in the extensive development of cross-domain authentication techniques.However,the emergence of many attackers equipped with quantum computers has the potential to launch quantum computing attacks against cross-domain authentication schemes based on traditional cryptography,posing a significant security threat.In response to the aforementioned challenges,our paper demonstrates a post-quantum cross-domain identity authentication scheme to negotiate the session key used in the cross-chain asset exchange process.Firstly,our paper designs the hiding and recovery process of user identity index based on lattice cryptography and introduces the identity-based signature from lattice to construct a post-quantum cross-domain authentication scheme.Secondly,our paper utilizes the hashed time-locked contract to achieves the cross-chain asset exchange of blockchain nodes in different trust domains.Furthermore,the security analysis reduces the security of the identity index and signature to Learning With Errors(LWE)and Short Integer Solution(SIS)assumption,respectively,indicating that our scheme has post-quantum security.Last but not least,through comparison analysis,we display that our scheme is efficient compared with the cross-domain authentication scheme based on traditional cryptography. 展开更多
关键词 cross-domain identity authentication lattice-based cryptography blockchain hashed time-locked contract
下载PDF
Cross-Domain Authentication Scheme Based on Blockchain and Consistent Hash Algorithm for System-Wide Information Management 被引量:1
4
作者 Lizhe Zhang Yongqiang Huang +1 位作者 Jia Nie Kenian Wang 《Computers, Materials & Continua》 SCIE EI 2023年第11期1467-1488,共22页
System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation ai... System-wide information management(SWIM)is a complex distributed information transfer and sharing system for the next generation of Air Transportation System(ATS).In response to the growing volume of civil aviation air operations,users accessing different authentication domains in the SWIM system have problems with the validity,security,and privacy of SWIM-shared data.In order to solve these problems,this paper proposes a SWIM crossdomain authentication scheme based on a consistent hashing algorithm on consortium blockchain and designs a blockchain certificate format for SWIM cross-domain authentication.The scheme uses a consistent hash algorithm with virtual nodes in combination with a cluster of authentication centers in the SWIM consortium blockchain architecture to synchronize the user’s authentication mapping relationships between authentication domains.The virtual authentication nodes are mapped separately using different services provided by SWIM to guarantee the partitioning of the consistent hash ring on the consortium blockchain.According to the dynamic change of user’s authentication requests,the nodes of virtual service authentication can be added and deleted to realize the dynamic load balancing of cross-domain authentication of different services.Security analysis shows that this protocol can resist network attacks such as man-in-the-middle attacks,replay attacks,and Sybil attacks.Experiments show that this scheme can reduce the redundant authentication operations of identity information and solve the problems of traditional cross-domain authentication with single-point collapse,difficulty in expansion,and uneven load.At the same time,it has better security of information storage and can realize the cross-domain authentication requirements of SWIM users with low communication costs and system overhead.KEYWORDS System-wide information management(SWIM);consortium blockchain;consistent hash;cross-domain authentication;load balancing. 展开更多
关键词 System-wide information management(SWIM) consortium blockchain consistent hash cross-domain authentication load balancing
下载PDF
BLECA: A Blockchain-Based Lightweight and Efficient Cross-Domain Authentication Scheme for Smart Parks
5
作者 Fengting Luo Ruwei Huang Yuyue Chen 《Computers, Materials & Continua》 SCIE EI 2023年第11期1815-1835,共21页
Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnesse... Smart parks serve as integral components of smart cities,where they play a pivotal role in the process of urban modernization.The demand for cross-domain cooperation among smart devices from various parks has witnessed a significant increase.To ensure secure communication,device identities must undergo authentication.The existing cross-domain authentication schemes face issues such as complex authentication paths and high certificate management costs for devices,making it impractical for resource-constrained devices.This paper proposes a blockchain-based lightweight and efficient cross-domain authentication protocol for smart parks,which simplifies the authentication interaction and requires every device to maintain only one certificate.To enhance cross-domain cooperation flexibility,a comprehensive certificate revocation mechanism is presented,significantly reducing certificate management costs while ensuring efficient and secure identity authentication.When a park needs to revoke access permissions of several cooperative partners,the revocation of numerous cross-domain certificates can be accomplished with a single blockchain write operation.The security analysis and experimental results demonstrate the security and effectiveness of our scheme. 展开更多
关键词 cross-domain authentication blockchain smart parks Certificate authority(CA) distributed collaboration Internet of Things(IoT)
下载PDF
A Privacy Enabled Fast Dynamic Authentication and Authorization for B3G/4G Mobility
6
作者 Zhikui CHEN Song YANG 《Communications and Network》 2009年第2期74-81,共8页
Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (... Mobile technologies make their headway by offering more flexibility to end-users and improve the productivities. Within the application of ubiquitous access and pervasive communication, security (or privacy) and QoS (Quality of Service) are two critical factors during global mobility, so how to get a smooth and fast handover based on a user privacy protected infrastructure is our focus. Based on a user-centric vir-tual identity defined by EU IST project Daidalos, this paper firstly proposes an effective infrastructure which protects the context-driven access policies for online services in order to avoid attacks by malicious eaves-droppers. In the proposed infrastructure, SMAL and Diameter are used to securely protect and deliver au-thenticated and authorized entities and XACML is used to authorize the user-level privacy policy. On the basis of it, a dynamic fast authentication and authorization handover mechanism is proposed which can save one trip communication time consummation between administrative domains. 展开更多
关键词 PRIVACY Policy Security VID authentication authorization
下载PDF
Embedding Authentication &Authorization in Discovery Protocols for Standard Based Publish/Subscribe Middleware: A Performance Evaluation
7
作者 Fabrizio Ronci Marco Listanti 《Communications and Network》 2011年第1期39-49,共11页
Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to ... Standard based Pub/Sub middleware, such as OMG Data Distribution Service (DDS), could assume a key role in supporting computer communications requiring continuous state information updating, deterministic deadline to data delivering and real time information adjourning. This kind of capability could be well ex-ploited by Peer-To-Peer (P2P) systems, Internet-wide as long as private ones, like in Public Safety or Civil Protection Communication Systems;but Pub/Sub specifications, and DDS/RTPS (Real Time Publish Sub-scribe) as well, usually do not provide Authentication & Authorization (AA) mechanisms. In the present work two important novelties are assessed: a possible scheme to implement AA in DDS/RTPS networks and a time performance evaluation study about embedded Authentication in RTPS. 展开更多
关键词 MIDDLEWARE PUBLISH/SUBSCRIBE Data Distribution Service authentication authorization
下载PDF
TWO-STEP MOBILE AGENT BASED AUTHENTICATION ARCHITECTURE:TOWARDS EFFECTIVE GRID AUTHENTICATION
8
作者 王海艳 王汝传 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第1期61-66,共6页
The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the... The grid technology is recognized as the next generation of Internet and becomcs the center of recent researches in the computer society. Security is one of the most crucial issues to address in Internet and is of the same importance in the application of grid technology. As a critical component of grid security, the secure authen- tication needs to be well studied. In this paper, a two-step mobile agent based(TSMAB) authentication architecture is proposed based on Globus security infrastructure (GSI). By using mobile agent (MA) technology, the TSMAB authentication architecture is composed of the junior-authentication and the senior-authentication. Based on the design and the analysis of TSMAB model, the result shows that the efficiency of grid authentication is improved compared with the GSI authentication. 展开更多
关键词 authentication ARCHITECTURE GRID certificate authority(CA)
下载PDF
Design of Distributed Authentication Mechanism for Equipment Support Information Network 被引量:1
9
作者 晏杰 卢昱 +1 位作者 陈立云 王昌盛 《Journal of Donghua University(English Edition)》 EI CAS 2016年第2期266-271,共6页
Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed ... Considering the secure authentication problem for equipment support information network,a clustering method based on the business information flow is proposed. Based on the proposed method,a cluster-based distributed authentication mechanism and an optimal design method for distributed certificate authority( CA)are designed. Compared with some conventional clustering methods for network,the proposed clustering method considers the business information flow of the network and the task of the network nodes,which can decrease the communication spending between the clusters and improve the network efficiency effectively. The identity authentication protocols between the nodes in the same cluster and in different clusters are designed. From the perspective of the security of network and the availability of distributed authentication service,the definition of the secure service success rate of distributed CA is given and it is taken as the aim of the optimal design for distributed CA. The efficiency of providing the distributed certificate service successfully by the distributed CA is taken as the constraint condition of the optimal design for distributed CA. The determination method for the optimal value of the threshold is investigated. The proposed method can provide references for the optimal design for distributed CA. 展开更多
关键词 equipment support information network identity authentication distributed certificate authority(CA) CLUSTERING threshold optimization
下载PDF
Cross-heterogeneous Domain Authentication Scheme Based on Blockchain 被引量:2
10
作者 Jing Liu Yixin Liu +3 位作者 Yingxu Lai Rongchen Li Siyu Wu Sami Mian 《Journal of Artificial Intelligence and Technology》 2021年第2期92-100,共9页
With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use publ... With the rising popularity of the Internet and the development of big data technology,an increasing number of organizations are opting to cooperate across domains to maximize their benefits.Most organizations use public key infrastructure to ensure security in accessing their data and applications.However,with the continuous development of identity-based encryption(IBE)technology,small-and medium-sized enterprises are increasingly using IBE to deploy internal authentication systems.To solve the problems that arise when crossing heterogeneous authentication domains and to guarantee the security of the certification process,we propose using blockchain technology to establish a reliable cross-domain authentication scheme.Using the distributed and tamper-resistant characteristics of the blockchain,we design a cross-domain authentication model based on blockchain to guarantee the security of the heterogeneous authentication process and present a cross-domain authentication protocol based on blockchain.This model does not change the internal trust structure of each authentication domain and is highly scalable.Furthermore,on the premise of ensuring security,the process of verifying the signature of the root certificate in the traditional cross-domain authentication protocol is improved to verify the hash value of the root certificate,thereby improving the authentication efficiency.The developed prototype exhibits generality and simplicity compared to previous methods. 展开更多
关键词 public key infrastructure identity-based encryption cross-domain authentication blockchain
下载PDF
基于区块链的多源网络大数据安全访问权限认证仿真 被引量:4
11
作者 李斌 何辉 +1 位作者 赵中英 郭景维 《电信科学》 北大核心 2024年第2期107-115,共9页
多源网络大数据的频繁交互与存储打破了传统数据“孤岛”,实现了跨区域与跨组织的数据访问,为数据的安全和隐私保护带来巨大挑战。访问认证作为保护数据与资源安全的技术之一,在获取所有数据节点信任的同时,面临巨大的通信负载,会造成... 多源网络大数据的频繁交互与存储打破了传统数据“孤岛”,实现了跨区域与跨组织的数据访问,为数据的安全和隐私保护带来巨大挑战。访问认证作为保护数据与资源安全的技术之一,在获取所有数据节点信任的同时,面临巨大的通信负载,会造成数据丢失和破坏,为此,提出一种基于区块链研究多源网络大数据安全访问权限认证方法。以相似关系度量数据在网络传输中的变化状态,根据相似矩阵计算多源网络数据访问概率。通过区块链技术建立数据安全访问合约,标定数据的访问属性以及交易密文,并将数据压缩在对应属性内。根据访问目的分析其访问信度,以信度作为标准对应安全等级,在不同信度下定制访问规则,认证数据安全访问的具体权限,实现方法设计。实验结果表明,以不同数据属性含量作为测试条件,在常规模式和攻击模式下对数据进行加密和解密处理,新方法可以实现较快的认证响应,实现网络数据的安全访问。 展开更多
关键词 区块链 多源网络 大数据 安全访问 权限认证
下载PDF
基于JWT的EAST实验数据用户身份和服务权限认证 被引量:2
12
作者 申正阳 王枫 任环宇 《计算机应用与软件》 北大核心 2024年第5期327-331,344,共6页
用户身份和服务权限认证已成为身份验证和数据访问安全的重要手段。用户身份认证采用动态令牌技术JWT实现。针对JWT丢失和被截获的问题,提出加密存储、解密使用的策略和IP与JWT绑定机制。根据EAST实验数据和用户的现状,将用户资源划分... 用户身份和服务权限认证已成为身份验证和数据访问安全的重要手段。用户身份认证采用动态令牌技术JWT实现。针对JWT丢失和被截获的问题,提出加密存储、解密使用的策略和IP与JWT绑定机制。根据EAST实验数据和用户的现状,将用户资源划分为二级用户,将服务资源划分为三级资源,采用图数据库Neo4j存储用户和资源之间的权限关系,并提出位图法加速权限认证。实验结果表明,基于JWT的认证方法及其安全策略能够有效解决身份和权限认证的问题。相较于传统的关系数据库存储用户权限,图数据库Neo4j和位图法能有效地提高权限认证效率。 展开更多
关键词 身份认证 权限认 JWT EAST 图数据库 位图法
下载PDF
基于对称加密算法的企业电子邮件权限安全管理 被引量:1
13
作者 陈又咏 蔡清远 +2 位作者 张富林 董昌朝 冯兰贤 《电子设计工程》 2024年第4期65-70,共6页
进行企业电子邮件权限安全管理时,主要采用非对称加密算法,导致企业电子邮件权限的安全管理效果较差,权限安全管理的时间开销较大。为此,设计一种融合对称加密算法的企业电子邮件权限安全管理方法。根据电子邮件实际内容定义标签和标识... 进行企业电子邮件权限安全管理时,主要采用非对称加密算法,导致企业电子邮件权限的安全管理效果较差,权限安全管理的时间开销较大。为此,设计一种融合对称加密算法的企业电子邮件权限安全管理方法。根据电子邮件实际内容定义标签和标识,明确电子邮件的安全级别。基于邮件发送人在企业内充当的角色,设计一种对称加密算法对电子邮件内容进行加密。运用PMI+PKI技术,结合身份认证特性和权限分配特性,建立邮件权限控制机制。从发送者和接收者两方面入手,认证电子邮件安全访问权限,实现企业电子邮件安全管理。实验结果显示,所提方法的邮件权限安全管理效果较好,整体时间开销为0.38 s,相比基于区块链、基于差分隐私的方法,时间开销分别减少了68.07%、39.11%。 展开更多
关键词 对称加密算法 电子邮件 信息安全 权限管理 隐私保护 权限认证
下载PDF
基于SM9的JWT强身份认证方案 被引量:1
14
作者 罗娇燕 左黎明 +1 位作者 陈艺琳 郝恬 《计算机技术与发展》 2024年第3期110-117,共8页
随着网络信息技术的快速发展,身份认证的应用范围也在不断扩大。其中,JWT(JSON Web Token)作为基于Token的身份认证技术,被广泛应用于Web应用程序和API领域,以实现简单、可靠的身份验证和安全通信。然而,开发人员对于JWT标准和技术细节... 随着网络信息技术的快速发展,身份认证的应用范围也在不断扩大。其中,JWT(JSON Web Token)作为基于Token的身份认证技术,被广泛应用于Web应用程序和API领域,以实现简单、可靠的身份验证和安全通信。然而,开发人员对于JWT标准和技术细节理解不够深入,导致该技术在实践中经常出现各种安全漏洞。文中分析了近年来出现的有关JWT技术的安全问题,包括“none”算法绕过、敏感信息泄露、算法混淆攻击和密钥穷举攻击等,并针对这些问题提出了一种基于国密SM9的JWT强身份认证方案。该方案使用SM9公钥密码算法对JWT进行签名和验证,结合基于时间戳和随机数的验证机制,以提高算法的安全性和可靠性。最后对该方案进行安全性分析,结果表明该方案实现方法相对简单,能够有效地防御各种常见的JWT安全漏洞,同时具有良好的安全性和易用性,为JWT技术的安全应用提供了一种高效可靠的解决方法。 展开更多
关键词 身份认证 JWT SM9 数字签名 授权
下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
15
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 cross-domain authentication trust evaluation autoencoder
下载PDF
GIS用户中台的设计与实现
16
作者 倪文礼 吴永军 王燕午 《测绘标准化》 2024年第1期74-78,共5页
为了解决每一个与地理信息相关的应用系统,均需建立一套用户管理、部门管理、地图服务管理、权限认证机制的问题,本文借鉴“大中台、小前台”的理念,基于微服务架构设计,开发了一个可自由伸缩的地理信息系统(GIS)用户中台。该中台采用... 为了解决每一个与地理信息相关的应用系统,均需建立一套用户管理、部门管理、地图服务管理、权限认证机制的问题,本文借鉴“大中台、小前台”的理念,基于微服务架构设计,开发了一个可自由伸缩的地理信息系统(GIS)用户中台。该中台采用服务生产者、消费者的模式构建,基于SpringBoot2.0框架整合Dubbo,实现地理信息应用系统的统一权限管理和应用授权。用户中台具有用户信息统一管理系统、角色权限统一管理系统、统一认证系统、统一授权系统、日志管理系统和监控分析系统等功能。 展开更多
关键词 地理信息系统 用户中台 地图服务管理 身份认证 应用授权 微服务
下载PDF
Cross-domain identity authentication scheme based on blockchain and PKI system 被引量:2
17
作者 Hai Zhang Feng Zhao 《High-Confidence Computing》 2023年第1期8-17,共10页
In vehicular ad hoc networks(VANET),the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users.The Public Key Infrastructur... In vehicular ad hoc networks(VANET),the cross-domain identity authentication of users is very important for the development of VANET due to the large cross-domain mobility of vehicle users.The Public Key Infrastructure(PKI)system is often used to solve the identity authentication and security trust problems faced by VANET.However,the PKI system has challenges such as too centralized Authority of Certification Authority(CA),frequent cross-domain access to certificate interactions and high authentication volume,leading to high certificate management costs,complex cross-domain authentication paths,easy privacy leakage,and overburdened networks.To address these problems,this paper proposes a lightweight blockchain-based PKI identity management and authentication architecture that uses smart contracts to reduce the heavy burden caused by CAs directly managing the life cycle of digital certificates.On this basis,a trust chain based on smart contracts is designed to replace the traditional CA trust chain to meet the general cross-domain requirements,to effectively avoid the communication pressure caused by a mass of certificate transmissions.For the cross-domain scenario with higher privacy and security requirements the identity attribute authentication service is provided directly while protecting privacy by using the Merkle tree to anchor identity attribute data on and off the blockchain chain.Finally,the proposed scheme was comprehensively analyzed in terms of cost,time consumption and security. 展开更多
关键词 Vehicular ad hoc network PKI Blockchain cross-domain authentication
原文传递
基于SSM的求职招聘系统设计
18
作者 杨晟 《科技创新与应用》 2024年第21期111-114,共4页
针对企业招聘和毕业生求职的需要,设计一款在线求职管理系统。该系统基于SSM技术进行开发,设计用户信息模块、招聘信息模块、简历信息模块、院校信息模块、招聘公告模块和岗位信息模块等功能。用人单位可以使用系统发布招聘公告信息,求... 针对企业招聘和毕业生求职的需要,设计一款在线求职管理系统。该系统基于SSM技术进行开发,设计用户信息模块、招聘信息模块、简历信息模块、院校信息模块、招聘公告模块和岗位信息模块等功能。用人单位可以使用系统发布招聘公告信息,求职者可以使用系统进行招聘信息的筛选并投递简历,管理员可以进行系统信息的维护。系统能够打通用人单位和求职者时间和空间之间的壁垒,让招聘和求职需求在平台中进行无缝对接,节约用人单位和求职者的时间成本和人力成本。同时,系统加入安全管理进行用户身份的验证和权限的管控,防止越权操作;数据库访问使用MyBatis作为对象关系映射(ORM)工具,采用参数化查询及最小化数据库操作权限防止SQL注入,确保系统的安全性。 展开更多
关键词 求职招聘 SSM ORM 身份认证 权限管控
下载PDF
Fortifying the Digital Bastion: Pioneering Cybersecurity with Dynamic Secrets Management and CMDB Fusion in the Enterprise
19
作者 Gyani Pillala 《Journal of Information Security》 2024年第4期411-418,共8页
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus... In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity. 展开更多
关键词 Dynamic Secrets Management Logical Environments Configuration Management Database (CMDB) Secrets Orchestration M2M (Machine to Machine) authentication/authorization Developer Productivity
下载PDF
区块链技术与电力大数据安全的深度融合
20
作者 范亚娜 李媛 翟斌 《科学与信息化》 2024年第7期65-67,共3页
电网业态的变化,尤其是智能电网的快速布局,电力数据流实现倍增,服务对象的不确定性、服务形式的多样化,使数据安全形势愈发严峻。区块链技术在数据溯源、数据加密、去中心化方面存在天然优势,可以为电力大数据安全提供系统级的底层数... 电网业态的变化,尤其是智能电网的快速布局,电力数据流实现倍增,服务对象的不确定性、服务形式的多样化,使数据安全形势愈发严峻。区块链技术在数据溯源、数据加密、去中心化方面存在天然优势,可以为电力大数据安全提供系统级的底层数据交互支撑。电力大数据的应用价值和潜在风险是并存的,本文基于区块链技术,从数字身份管理、数据交易平台构建、过程安全管控几个方面与电力大数据实现深度融合,旨在实现整体安全水平的快速提升。 展开更多
关键词 区块链 电力大数据 数据源认证 访问授权
下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部