首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
RADIUS协议是被广泛用于网络认证。计费等系统的协议。文中以RADIUS协议为研究视角,介绍了RADIUS协议的工作原理、认证流程和及RADIUS服务器地址及分析情况。  相似文献   

2.
RADIUS协议在AAA系统中的应用研究   总被引:2,自引:0,他引:2  
RADIUS协议在宽带网络认证授权计费解决方案AAA认证系统中得到了广泛应用.介绍了RADIUS协议的结构特点、报文内容、AAA系统架构和802.1x标准,讨论了RADIUS认证的工作流程,研究了RADIUS协议的认证机制以及在Linux环境下RADIUS服务器的配置方法,建立了RADIUS认证服务器的功能模型,分析了RADIUS协议所采取的安全措施以及存在的安全隐患,并对其安全性的进一步完善提出了建议.  相似文献   

3.
RADIUS协议安全分析   总被引:2,自引:0,他引:2  
安全是RADIUS协议的首要话题。本文首先描述认证码Authenticator在RADIUS协议安全中的重要作用,接着讨论了攻击RADIUS协议的一些方法,最后阐述了防止攻击的一些策略。  相似文献   

4.
陈新  白英彩 《计算机工程》2003,29(Z1):80-83
该文介绍了RADIUS协议及其在网络接入服务器Matix2000中的应用,包括RADIUS的特性及其实现,以满足ISP多种业务管理的需要;并对RADIUS协议的安全性进行分析,提出了必要的防范措施.  相似文献   

5.
RADIUS服务器安全性分析及其改进   总被引:1,自引:0,他引:1       下载免费PDF全文
张琪  喻占武  李锐 《计算机工程》2007,33(5):146-148
对RADIUS协议所采用的通过共享密钥、认证码等实现的安全措施进行分析,指出其仍然存在的多方面的安全漏洞。在实现中针对RADIUS协议的安全漏洞采取可能的改进措施,在一定程度上弥补了RADIUS协议安全性上的不足,使实现的RADIUS服务器端更好地满足了实际应用的需要。  相似文献   

6.
基于RADIUS协议的AAA服务器设计及其在移动IP中的应用研究   总被引:1,自引:0,他引:1  
本文首先简要介绍了AAA的基本概念与体系结构,并重点分析了当前主流的RADIUS协议.主要包含RADIUS协议的框架和原理,然后给出了基于RADIUS协议的AAA服务器的设计,并对该服务器在移动IP中的应用做了探讨.最后分析了AAA技术的发展趋势。  相似文献   

7.
为了解决VoIP认证计费问题,介绍了RADIUS协议及SIP认证方式,提出了扩展RADIUS协议以支持SIP认证的方法,并详细说明了经由认证处理的呼叫建立过程,给出了基于RADIUS和SIP协议的VoIP认证的具体实现方式,最后通过在SIP代理服务器上部署相应的计费策略,并结合RADIUS服务器的计费功能,给出了VoIP计费的实现方法.  相似文献   

8.
RADIUS协议安全性分析   总被引:5,自引:1,他引:5  
张海峰  姜建国 《计算机工程》2003,29(7):122-123,183
RADIUS是一个在网络环境下被广泛使用的认证、授权、记账(AAA)协议。然而,RADIUS协议本身设计的缺陷以及对它的扭腊实现都使得它易于受到攻击。文章对RADIUS协议的安全隐患进行了分析,并提出了解决这些问题的方法。  相似文献   

9.
借助于Linux/Netfilter强大的包过滤功能,将RADIUS的授权属性转换为对用户的包过滤策略是RADIUS协议应用的一个趋势。为提高RADIUS网关工作效率,本文从软件实现了对RADIUS网关进行优化,提出通用数据结构存放RADIUS授权属性值以及高效的包过滤算法提高网关的工作效率。  相似文献   

10.
IEEE 802.1x是针对端口的认证协议,是对用户进行认证的一种方法和策略。本文简要介绍802.1x协议和RADI-US协议的基本概念和原理,对基于802.1x协议的RADIUS协议在宽带认证中的应用做了分析,给出RADIUS的工作流程并指出这种认证的优缺点。  相似文献   

11.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

12.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

13.
本文分析了法律数据库的结构和特点,介绍了采用面向对象设计方法和超文本数据库技术开发和实现法律信息库系统将作为重要网络资源之一为不同用户进行法律咨询服务。  相似文献   

14.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

15.
16.
17.
正SCIENCE CHINA Information Sciences(Sci China Inf Sci),cosponsored by the Chinese Academy of Sciences and the National Natural Science Foundation of China,and published by Science China Press,is committed to publishing highquality,original results of both basic and applied research in all areas of information sciences,including computer science and technology;systems science,control science and engineering(published in Issues with odd numbers);information and communication engineering;electronic science and technology(published in Issues with even numbers).Sci China Inf Sci is published monthly in both print and electronic forms.It is indexed by Academic OneFile,Astrophysics Data System(ADS),CSA,Cabells,Current Contents/Engineering,Computing and Technology,DBLP,Digital Mathematics Registry,Earthquake Engineering Abstracts,Engineering Index,Engineered Materials Abstracts,Gale,Google,INSPEC,Journal Citation Reports/Science Edition,Mathematical Reviews,OCLC,ProQuest,SCOPUS,Science Citation Index Expanded,Summon by Serial Solutions,VINITI,Zentralblatt MATH.  相似文献   

18.
正Erratum to:J Zhejiang Univ-Sci C(ComputElectron)2014 15(7):551-563doi:10.1631/jzus.C1300320The original version of this article unfortunately contained mistakes.Algorithm 6 should be as follows:Algorithm 6 FGKFCM-F clustering Input:(1)X={x_1,x_2,…,x_N},,x_iR~d,i=1,2,…,N,the dataset;(2)C,1C≤N,the number of clusters;(3)ε0,the stopping criterion;  相似文献   

19.
20.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号