期刊文献+

基于eID的网络可信身份体系建设研究 被引量:7

Research on Trusted Identity Architecture in Cyberspace Based on e ID
下载PDF
导出
摘要 网络空间可信身份管理是当下亟需解决的一个重要问题。文章针对目前网络空间存在的安全问题及网络发展的需求,研究建设基于e ID的网络可信身份体系,提出了包含五类实体的网络可信身份体系框架,描述了体系中的关键流程,并给出了面向大数据环境的隐私保护方法。研究表明,该体系能够保障用户身份可信、保护用户身份隐私、调动社会各方积极参与,将对网络应用有序发展、网络空间安全保障起到至关重要的作用。 Trusted identity management in cyberspace is a main problem to be resolved today. In this paper, for the security issues and requirements in cyberspace, we researched on trusted identity architecture. A framework for trusted identity architecture in cyberspace based on eID was proposed, key processes working in this architecture were described, and privacy protection method against big data analysis was presented. The research shows this architecture can ensure the user identity credibility, the privacy protection, and the participation of various parts in society, and will play a crucial role in the orderly development of internet applications and the guarantee of cyberspace security.
出处 《信息网络安全》 2015年第9期97-100,共4页 Netinfo Security
关键词 网络可信身份体系 网络电子身份标识 隐私保护 trusted identity architecture in cyberspace electronic identity privacy protection
  • 相关文献

参考文献9

  • 1中国互联网络信息中心.第35次中国互联网络发展状况统计报告[R].2015.2.3.
  • 2张立武.网络信任体系发展趋势研究[J].信息网络安全,2011(7):69-71. 被引量:6
  • 3公安部第三研究所.公民网络电予身份标识[EB/OL].http://www.eID.cn,2015.
  • 4卿斯汉.关键基础设施安全防护[J].信息网络安全,2015(2):1-6. 被引量:44
  • 5Noack Torsten, Kubicek Herbert. The introduction of online authentication as part of the new electronic national identity card in Gemlany]. Identity in the Information Society, 2010, 3(1): 87-110.
  • 6傅坦坦,马启航,陈雅婕,王勇.移动终端数据泄露动态监控系统[J].信息网络安全,2014(5):68-72. 被引量:2
  • 7The White House. The National Strategy for Trusted Identities in Cyberspace[EB/OL]. http://www.nist.gov/nstic, 2011.
  • 8Ame Tauber, Zefferer Thomas, Zwattendorfer Bemd. Approaching the Challenge of eID Interoperability: An Austrian Perspective[J]. European Journal of ePractice, 2012, ( 14 ) : 22-39.
  • 9张金鑫,杨晓辉.基于权限分析的Android应用程序检测系统[J].信息网络安全,2014(7):30-34. 被引量:14

二级参考文献28

  • 1陆伟峰.监视和控制网络出口BT流量——北京伟世盾安公司PU网络流量优化服务器的监控方案[J].计算机安全,2005(2):40-42. 被引量:5
  • 2Thomas Wu, Michael Malkin, Dan Boneh. Building Intrusion Tolerant Applications[C]. In the 8th USENIX Security Symposium. August,1999.23-24.
  • 3V. Shoup. Practical Threshold Signatures[C]. In Eurocrypt'00, LNCS 1807, Springer-Verlag, 2000, 207-220.
  • 4Ji-wu Jing, Peng Liu, Deng-guo Feng, Ji Xang, Neng Gao. A Highly Attack Resilient Certification Authority[C]. 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003.53-63.
  • 5CAS. Central Authentication Service project website[EB/OL], http:// wvew.jasig.org/cas, 2011-05-24.
  • 6Shibboleth website[EB/OL], http://shibboleth.internet2.edu.
  • 7Cantor S, Kemp J, et al. Security Assertion Markup Language(SAML) version 2.0, OASIS Standard, 2005.
  • 8OpenlD website[EB/OL], http://openid.net/.
  • 9PRIME: Privacy and Identity Management for Europe[EB/OL]. https://www.prime-proj ect.eu/.
  • 10Rebekah Lepro. Cardea: Dynamic Access Control in Distributed Systems. NASA Technical Report NAS-03-020 November 2003.

共引文献109

同被引文献53

引证文献7

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部