共查询到20条相似文献,搜索用时 16 毫秒
1.
2.
3.
4.
Privacy preservation with X.509 standard certificates 总被引:1,自引:0,他引:1
Taekyoung Kwon 《Information Sciences》2011,181(13):2906-204
Privacy preservation has become an essential requirement in today’s computing environment; abuse based on anonymity and user-controlled pseudonyms is a serious problem. For prompt deployment in legacy information systems, it would be desirable to develop a new method in the standard paradigm. This paper investigates practical methods for privacy preservation with X.509 standard certificates by providing conditional traceability for both identity and attribute certificates in the legacy systems. We separate certificate authorities, one for verifying identities and the other for validating contents, in a blinded manner without requiring a trusted third party. We design a concrete method with its more generic and applicative extensions, and prove security formally. We also evaluate performance through rigorous experiments and discuss possible applications. 相似文献
5.
文中提出了一种基于认证的网络权限管理技术,实现了针对用户的策略和权限管理,并研究了本认证系统的可靠性,利用Bcrypt算法等技术解决了认证系统中存在的安全问题,提高了整个系统的可靠性。这项技术目前已经应用到实际工作中。 相似文献
6.
Role-based access control with X.509 attribute certificates 总被引:2,自引:0,他引:2
We adapted the standard X.509 privilege management infrastructure to build an efficient role-based trust management system in which role assignments can be widely distributed among organizations, and an XML-based local policy determines which roles to trust and which privileges to grant. A simple Java API lets target applications easily incorporate the system. The Permis API has already proven its general utility in four very different applications throughout Europe. 相似文献
7.
Wu Liu Jianping Wu Haixin Duan Xing Li 《通讯和计算机》2005,2(5):68-74
This paper presents an authorization solution for resource management and control developing as a part of the China Education and Research Network (CERNET) to perform fine-grained authorization of job and resource management requested in the Grid environment which meets the Fusion-G-rid's security needs in large scale networks such as CERNET. It integrates the GT2 job manager and X.509 authorization, and this model can be extended to other authorization decision functions. It allows the system to evaluate a user's resource specification language request against authorization policies on resource usage. Furthermore, based on XML integrated authorization policies, it allows other virtual organization members to manage the users' resources. 相似文献
8.
身份认证中的关键技术是身份信息的安全存储、处理和传递,本文提出了一种基于智能卡的X.509身份认证方案,设计了一套基于X.509的身份认证协议,将智能卡作为存储身份信息的载体,密码运算都在智能卡内部进行,认证过程安全性好.在开放的网络环境中,此方案可较好地防止中间人攻击,验证用户身份. 相似文献
9.
10.
本文介绍了X509数字证书及其Java编程接口,并实现了用于X509证书颁发和验证的JavaBean,可做为数字签名、加密解密及SSL通信系统的编程参考。 相似文献
11.
采用认证测试方法对X.509协议的认证正确性进行了分析,该方法比BAN逻辑分析得到的结论更具体,比传统串空间理论构造集合寻找M-minimal元素的方法更为简单直观。然后针对分析结论提出了改进协议,并使用认证测试方法证明了改进协议在保持数据保密性完整性的同时,也能实现认证的正确性。 相似文献
12.
13.
X.509证书是PKI(公钥基础设施)的重要组成部分,目前得到了很广泛的应用。设计并实现了一个轻量级的X.509证书库,比较了国内外同类产品的优缺点,给出了该证书库的具体模块设计,并指出了其应用前景。 相似文献
14.
15.
身份认证问题是网络安全的重要研究课题,利用椭圆曲线密码系统相对于其他公钥密码体制具有密钥长度短、运算速度快、计算数据量小的特点,结合X.509证书构建一个新的、高效的、安全的身份认证方案. 相似文献
16.
描述了用于电子政务身份认证的X.509v3证书的结构及其语义,特别是对证书扩展域作了重点分析,提出了标准化的方法。 相似文献
17.
18.
As soon as a P2P application grows to the point where it becomes interesting, the issues of trust and security appear on the horizon. The core of the paper is on how to build trustful peer-to-peer networks with TLS and X.509 certificates under JXTA architecture. The use of authentication, authorization, and encryption establishes trust in P2P applications. Without a foundation of trust, many types of interesting applications such as e-commerce won't take hold on top of the P2P infrastructure. 相似文献
19.
20.
基于属性证书的X.509证书改进方案 总被引:3,自引:0,他引:3
传统X.509证书实现Web安全属性服务时有其一定的局限性。文章详细描述了Farrell等提出的属性证书格式,并给出了用一种基于属性证书的改进证书方案来实现Web上安全属性服务的模型。 相似文献