期刊文献+

基于可信度计算的网络接入认证模型研究 被引量:4

Research on trustworthiness computing-based network access authentication model
下载PDF
导出
摘要 由于远程终端本身的不安全性或合法身份被利用而导致内网安全事故,针对此问题,提出了一种基于可信度计算的网络接入认证模型,通过集成现有身份认证技术和可信度计算方法,动态计算终端的可信度值。当目标终端可信度低于设定值或访问超时,启动重新认证机制,从而弥补现有认证方法的不足。同时给出了该模型完整的执行过程。 Because of the insecurity of remote terminal or pretending to be a legal user, it resulted in safety accidents. Aiming at this problem, a network access authentication model based on trustworthiness computing is proposed. Through integrating the existing identity authentication technologies and trustworthiness computing methods, the trustworthiness of terminal can be dynamically computed. When the trustworthiness of terminal is below a certain value or access is overtime, re-authentication mechanism is started, accordingly repairing the shortage of existing authentication methods. The full executing process of the model is given.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第17期4417-4419,共3页 Computer Engineering and Design
基金 公安部金盾工程基金项目(J1GAB23W013)
关键词 网络安全 身份认证 认证机制 可信度 可信度计算 network safety identity authentication authentication mechanism trustworthiness trustworthiness computing
  • 相关文献

参考文献5

二级参考文献29

  • 1[1]RFC2289-1998.Haller A One-time Password system[S].
  • 2[2]Neil M Haller. The S/Key One-time Password System[C]. In Proceedings of the Internet Society Symposium on Network and Distributed System Security[A]. San Diego , CA ,1998.
  • 3[3]Jennifer Steiner, B Clifford Neuman,Jeffrey I Schiller. Kerberos : An Authentication Services for Open Network Systems[A]. In Proc. Winter USENIX Conference[C]. Dallas TX,1998.191-202.
  • 4王贵林 卿斯汉 马恒太.一个可公开验证秘密共享方案的安全性证明[A]..信息和通信安全-CCICS''03 第三届中国信息和通信安全学术会议论文集[C].北京:科学出版社,2003.268-276.
  • 5Shamir A.How to share a secret.Communications of the ACM,1979,22(11):612-613.
  • 6Blakley GR.Safeguarding cryptographic keys.In:Proc.of the National Computer Conf.AFIPS Conf.proc.AFIPS Press,1979,48:313-317.
  • 7Tompa M,Woll H.How to share a secret with cheaters.Journal of Cryptology,1988(1):133-138.
  • 8Stadler M.Publicly verifiable secret sharing.In:Maurer UM,ed.Proc.of the EUROCRYPT'96.LNCS 1070,Berlin:SpringerVerlag,1996.190-199.
  • 9He J,Dawson E.Multistage secret sharing based on one-way function.Electronics Letters,1994,30(19):1591-1592.
  • 10He J,Dawson E.Multisecret-Sharing scheme based on one-way function.Electronics Letters,1995,31(2):93-95.

共引文献21

同被引文献27

引证文献4

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部