首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
使用USBKey提高FreeRadius证书认证的安全性   总被引:1,自引:0,他引:1  
文章结合 USBKey,X.509,OpenCA 技术的研究,提出了一种用 USBKey 实现 FreelCadius EAP-TLS 证书管理和认证的方法,明显提高了 FreeRadius 身份认证的安全性和可管理性.  相似文献   

2.
谭颖  谈文蓉 《福建电脑》2008,24(5):111-113
本文对基于X.509证书的身份认证协议方案进行了分析,提出了一种新基于X.509身份认证协议。并使用协议分析工具对新协议进行了安全性分析。  相似文献   

3.
身份认证中的关键技术是身份信息的安全存储、处理和传递,本文提出了一种基于智能卡的X.509身份认证方案,设计了一套基于X.509的身份认证协议,将智能卡作为存储身份信息的载体,密码运算都在智能卡内部进行,认证过程安全性好.在开放的网络环境中,此方案可较好地防止中间人攻击,验证用户身份.  相似文献   

4.
论述了X.509中身份认证方案的过程,并对其安全性进行了描述。  相似文献   

5.
Internet X.509 PKI安全通信协议设计与证明   总被引:3,自引:0,他引:3  
安全通信协议是公钥基础设施PKI的重要组成部分,实现PKI各构件之间的在线交互、身份认证、消息完整性及保密性。该文首先介绍X.509PKI的基本结构,然后提出一套安全协议解决方案,并用BAN逻辑对协议进行安全性证明。  相似文献   

6.
一个基于ECC的双向认证协议   总被引:1,自引:0,他引:1  
1.引言身份认证是网络安全技术的一个重要方面,身份认证机制限制非法用户访问网络资源,能够防止假冒、篡改、否认等攻击,确保用户的身份,是其他安全机制的基础。双向身份认证是指通信双方需要互相认证鉴别各自的身份。双向认证的典型方案是Needham-Schroeder协议。常见的认证协议还有分布认证安全服务(DASS)协议、ITU-T X.509认证协议等。  相似文献   

7.
首先提出Web服务的身份认证问题并对其解决措施进行了比较.然后介绍X.509数字证书的基本格式,并通过一个具体签名的SOAP消息实例阐述了X 509数字证书在Web服务身份认证中的应用.最后经过对具体试验数据的分析比较,显示了基于X 509数字证书的签名认证对Web服务性能的影响.  相似文献   

8.
移动IP中无线链路的开放性和节点的移动性,给移动节点的注册带来潜在的安全威胁。针对移动节点的注册安全问题,提出了一种USBKey辅助的注册认证协议。该协议通过USBKey保护移动节点的私钥以加强移动注册的安全性,结合数字信封技术与数字签名技术,实现相关协议实体的身份认证和注册信息的安全保护。分析结果表明,该协议可保证注册信息的完整性和机密性,可以有效抵御常见的安全攻击,保证移动节点的注册安全,并且比多数相关协议的注册认证迟延更小。  相似文献   

9.
基于USBKey的身份认证机制的研究与实现   总被引:1,自引:0,他引:1  
分析了USBKey应用于PKI认证过程中存在的不足,研究了Lee-Chiu等方案,给出基于USBKey的身份认证机制的增强方案,最后通过模拟环境对该认证算法进行编程实现.该方案实现"一次一密"的双向认证,能够抵御重放攻击、拒绝服务攻击、选择密文攻击、密钥猜测攻击、中间人攻击、假冒服务器攻击,增强了安全性.  相似文献   

10.
基于RFID技术的无线Key模型   总被引:1,自引:0,他引:1  
随着互联网应用的普及,USBKey在网上交易、身份签名和认证等各种电子商务活动中扮演着越来越重要的角色.因此USBKey的发展趋势成为人们关注的焦点.针对公司、银行、交易所等场所可能出现的USBKey使用的安全问题,本文提出了一种基于RFID技术的无线Key模型,并对其安全性进行了分析.  相似文献   

11.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

12.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

13.
In modern service-oriented architectures, database access is done by a special type of services, the so-called data access services (DAS). Though, particularly in data-intensive applications, using and developing DAS are very common today, the link between the DAS and their implementation, e.g. a layer of data access objects (DAOs) encapsulating the database queries, still is not sufficiently elaborated, yet. As a result, as the number of DAS grows, finding the desired DAS for reuse and/or associated documentation can become an impossible task. In this paper we focus on bridging this gap between the DAS and their implementation by presenting a view-based, model-driven data access architecture (VMDA) managing models of the DAS, DAOs and database queries in a queryable manner. Our models support tailored views of different stakeholders and are scalable with all types of DAS implementations. In this paper we show that our view-based and model driven architecture approach can enhance software development productivity and maintainability by improving DAS documentation. Moreover, our VMDA opens a wide range of applications such as evaluating DAS usage for DAS performance optimization. Furthermore, we provide tool support and illustrate the applicability of our VMDA in a large-scale case study. Finally, we quantitatively prove that our approach performs with acceptable response times.  相似文献   

14.
《Information & Management》2016,53(6):787-802
Discrepant technological events or situations that entail a problem, a misunderstanding or a difficulty with the Information Technology (IT) being employed, are common in the workplace, and can lead to frustration and avoidance behaviors. Little is known, however, about how individuals cope with these events. This paper examines these events by using a multi-method pragmatic approach informed by coping theory. The results of two studies – a critical incident study and an experiment – serve to build and test, respectively, a theoretical model that posits that individuals use a variety of strategies when dealing with these events: they experience negative emotions, make external attributions, and adopt engagement coping strategies directed at solving the event, eventually switching to a disengagement coping strategy when they feel they have no control over the situation. Furthermore, users’ efforts may result in ‘accidental’ learning as they try to overcome the discrepant IT events through engagement coping. The paper ends with a discussion of the results in light of existing literature, future opportunities for research, and implications for practice.  相似文献   

15.
Kim  K. H. 《Real-Time Systems》2004,26(1):9-28
Distributed real-time simulation is a young technology field but its practice is under increasing demands. In recent years the author and his collaborators have been establishing a new approach called the distributed time-triggered simulation (DTS) scheme which is conceptually simple and easy to use but widely applicable. The concept was initiated in the course of developing a new-generation object-oriented real-time programming scheme called the time-triggered message-triggered object (TMO) programming scheme. Some fundamental issues inherent in distributed real-time simulation that were learned during recent experimental studies are discussed along with some approaches for resolving the issues. An execution engine developed to support both the TMOs engaged in control computation and the TMOs engaged in DTS is also discussed along with its possible extensions that will enable significantly larger-scale DTSs.  相似文献   

16.
Zusammenfassung Mit zunehmender Größe der Softwaresysteme verschärfen sich die für die Software-Herstellung typischen Probleme: Beherrschen großer Objektmengen, Erhalten der Systemkonsistenz, Kontrolle der ständigen Änderungseinflüsse und Gewährleisten einer langen Lebensdauer. Die Disziplin Konfigurationsmanagement bildet den methodischen Ansatz, diese Probleme besser zu beherrschen. Software-Konfigurationsmanagement faßt die Herstellung von Softwaresystemen als eine Abfolge von kontrollierten Änderungen an gesicherten Zwischen- und Endergebnissen auf. Dargestellt werden die Objekte und Funktionen des Software-Konfigurationsmanagements sowie die hierfür in großen Software-Projekten benötigten Methoden, Instanzen und Hilfsmittel.  相似文献   

17.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and  相似文献   

18.
正Brain-machine interfaces(BMIs)aim at building a direct communication pathway between the brain and an external device,and represent an area of research where significant progress has been made during the past decade.Based on BMIs,mind information can be read out by neural signals to control  相似文献   

19.
正http://www.zju.edu.cn/jzus http://www.springerlink.com Aim The Journals of Zhejiang University-SCIENCE(A/B/C)are edited by the international board of distinguished Chinese and foreign scientists,and are aimed to present the latest developments and achievements in scientific research in China and overseas to the world’s scientific circles,especially to stimulate  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号