期刊文献+

一种基于ITU-T身份管理的双向认证系统 被引量:1

A Demand-oriented Mutual Authentication System Based on ITU-T Identity Management
原文传递
导出
摘要 联邦身份管理是一个在大规模异构网络环境中对身份进行统一管理的安全技术。在分析ITU-T联邦身份管理双向认证模型的基础上,根据实体安全需求设计认证系统,并针对模型的特点设计出一种面向实体安全需求的双向认证系统,最后简要分析了系统的安全性。该系统不仅能够有效保护实体身份信息的安全性,而且兼顾了实体需求和认证效率,可用于不同安全等级的应用场合,有较高的实用价值。 Federated Identity Management is a centralization of management security technology for identity in large-scale heterogeneous network environments. Based on analysis of mutual authentication mode in ITU-T federal identity management, an authentication system is proposed according to the security requirement of entity and a demand-oriented mutual authentica- tion system is designed by making use of the features of mode. The designed system could effectively protect the identity information of entity but also give consideration to the demand of entity and the efficiency of authentication system. This system could be used to application cases with different security-level environment, and is of fairly high practical value.
出处 《信息安全与通信保密》 2010年第2期73-75,共3页 Information Security and Communications Privacy
关键词 ITU—T 身份管理 双向认证 ITU-T IdM mutual authentication
  • 相关文献

参考文献6

  • 1倪亮,韩臻,何永忠.身份管理技术综述[J].信息安全与通信保密,2007,29(11):78-81. 被引量:6
  • 2薛丽敏,张霞.信息安全保障新体制研究[J].信息安全与通信保密,2009,31(6):52-54. 被引量:10
  • 3Focus Group on Identity Management. Report on Identity Management Framework for Global Interoperability[R]. Tokyo: ITU-T, 2007.
  • 4Focus Group on Identity Management. Report on Identity Management Ecosystem and Lexicon[R]. Tokyo: ITU-T, 2007.
  • 5Focus Group on Identity Management. Report on Identity Management Use Cases and Gap Analysis[R]. Tokyo: ITU-T, 2007.
  • 6Kaufman C.网络安全--公众世界中的秘密通信[M].许剑卓,左英男,译.第2版.北京:电子工业出版社,2004.

二级参考文献13

  • 1赵俊阁,吴晓平,秦艳琳.信息安全人才培养体系研究[J].北京电子科技学院学报,2006,14(1):27-29. 被引量:5
  • 2[美]Christopher M King,Curtis E Dalton,T Ertern Osmanoglu.安全体系结构的设计、部署与操作[M].常晓波,杨剑峰,译.北京:清华大学出版社,2003.
  • 3[1]Meta Group Inc.The Value of Identity Management:securing identity management provides value to the enterprise.August 2002.URL:http://www.pwcglobal.com/Extweb/service.nsf/8b9d788097dff3c9852565e00073c0ba/88a387cdb58b4c0085256c6a006e0036/$FILE/ValueoflMWhitePaper.pdf(26 Jan.2003).
  • 4[2]Identity and Access Management Solution GIAC Security Essentials Certification(GSEC) Practical Assignment Version 1.4cOption 1-Research on Topics in Information Security Martine LINARES on February 14,2005.
  • 5[3]Chong Frederick.Microsoft Corporation.Identity and Access Management.Jul.2004.6 Dec.2004.URL:http://msdn.microsoft.com/library/default.asp?url=/library/enus/dnmaj/html/aj3identity.asp.
  • 6[4]Introduction to the Liberty Alliance,Identity Architecture,Revision 1.0,March,2003 www.projectliberty.com.
  • 7[5]Federated Identity Management,by:Ajoy Kumar,12/20/2004,http://www.securitydocs.com/library/2782.
  • 8[6]E Maler,P Mishra,R Philpott.Assertion and Protocol for the OASIS Security Assertion Markup Language(SAML) V1.1.Version 1.1.OASIS Standards.http://www.oasisopen.org/committees/tc home.php?wg abbrev=security.
  • 9[7]S Cantor,F Hirsch,J Kemp,el at.Security Assertion Markup Language (SAML) V2.0.Version 2.0.OASIS Standards.http://www.oasisopen.org/committees/tc home.php?wg abbrev=security.
  • 10[8]Microsoft Corporation.Microsoft Identity and Access Management Series-Fundamental concepts.Jul.2004.18 Oct.2004.URL:http://www.microsoft.com/technet/security/topics/identity/idmanage/P1Fund.mspx.

共引文献14

同被引文献5

  • 1Liu J,Zhou A,Gao M.A New Mutual Authentication Scheme Based on Nonce and Smart Cards[J].Computer Communications,2008,31:2205-2209.
  • 2Tang C,Wu D.An Ecient Mobile Authentication Scheme for Wireless Networks[J].IEEE Transactions on Wireless Communications,2008,07(04):1408-1416.
  • 3Wu C,Lee W,Tsaur W.A Secure Authentication Scheme with Anonymity for Wireless Communications[J].IEEE Communications Letters,2008,12(10):722-723.
  • 4Lee C,Hwang M,Liao I.Security Enhancement on a New Authentication Scheme With Anonymity for Wireless Environments[J].IEEE Communications Letters,2006,53(05):1683-1687.
  • 5李林,穆灵.基于组合公钥的WSN认证协议的设计及分析[J].信息安全与通信保密,2009,31(7):93-95. 被引量:4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部