共查询到20条相似文献,搜索用时 51 毫秒
1.
2.
3.
4.
5.
本文以RSA体制为例,提出了密钥分配的自产生密钥式协议,详细分析了协议的安全性,并且在此基础上进一步提出了分布式的协议。两协议能比较好地满足网络开放环境下的密钥分配管理问题。 相似文献
6.
7.
本文提出建立在椭圆曲线密码系统上的一个基于PKI的移动通讯安全体制的设计方案,提供了一种更加安全的注册和认证方法。此系统能够保证网络上的合法用户的注册、以及在一个移动和无线环境下通信双方的相互认证和通信数据的保密性和完整性。通信数据的保密性和完整性由椭圆曲线密码体制(EllicticCurveCryptography)保证,此体制与一个用于密钥分配和管理的可靠的证书授权中心体系相结合。 相似文献
8.
该文主要介绍了如何利用个人证书及PGP(Pretty Good Privacy)发送、接收安全电子邮件并分析比较S/MIME和PGP的主要区别。 相似文献
9.
10.
提出了一种基于XKMS的证书验证机制,设计了集成在XKMS服务中的证书验证服务模块,描述了证书路径验证算法,改进了XKMS-OCSP机制,并给出了证书验证的过程。 相似文献
11.
TM卡技术原理及应用 总被引:1,自引:0,他引:1
介绍了一种新型的IC卡--TM卡。主要介绍了它的外型结构、电气原理和数据通讯的协议及时序;文章最后还对其应用进行了相应的论述。本文的目的旨在推动TM卡在我国各领域的应用。 相似文献
12.
Fang Fang Manoj Parameswaran Xia Zhao Andrew B. Whinston 《Information Systems Frontiers》2014,16(3):399-416
As organizations increasingly deploy Inter-organizational Information Systems (IOS), the interdependent security risk they add is a problem affecting market efficiency. Connected organizations become part of entire networks, and are subject to threats from the entire network; but members’ security profile information is private, members lack incentives to minimize impact on peers and are not accountable. We model the problem as a signaling-screening game, and outline an incentive mechanism that addresses these problems. Our mechanism proposes formation of secure communities of organizations anchored by Security Compliance Consortium (SCC), with members held accountable to the community for security failures. We study the interconnection decisions with and without the mechanism, and characterize conditions where the mechanism plays roles of addressing moral hazard and hidden information issues by screening the organizations’ security types and/or by providing them incentives to improve. We also discuss the welfare gains and the broad impact of the mechanism. 相似文献
13.
Windows 7操作系统UAC机制及其安全性分析 总被引:1,自引:0,他引:1
为了对微软新开发的Windows 7操作系统的安全性能有进一步了解,研究了Windows 7下UAC机制的原理,分析了Windows 7下UAC机制的特征,最后提出了权限提升的方法,进一步说明了在Windows 7下恶意进程权限提升的具体过程.实验结果表明,Windows 7下的UAC机制并不能完全防止恶意进程获取高权限. 相似文献
14.
为了解决现有数字版权管理中使用控制模型缺乏对细粒度数字内容的灵活和安全使用的问题,基于对一般使用控制模型UCONABC的扩展,提出了形式化的细粒度使用控制理论模型Gran-UCON及其原型系统安全框架和实现机制.该方案将数字资源实体进行细粒度分割,使其粒度减小到具有完整意义的基本单元,进一步通过许可授权加以安全控制.应用实例验证了该模型在数字内容用户终端使用中的安全性和灵活性. 相似文献
15.
16.
运算放大器工作原理的深度剖析 总被引:1,自引:0,他引:1
《电子技术应用》2015,(10):34-38
通过引入杠杆原理深度剖析运算放大器的工作特性,给出比较器与放大器、积分与比例积分电路、微分与比例微分电路、PID调节器的电路运算本质。如比较器与放大器的本质区别是反馈形式不同,积分电路的积分过程是恒流源对电容的充电过程,比例积分比积分快及比例微分比微分慢是因为串联电容的电阻起分压作用等。将电路原理映射到杠杆原理中,获得输入与反馈电路中的电阻电容对电路增益及相位的变化规律,用Saber软件仿真,结果验证了理论分析的正确性和有效性。 相似文献
17.
In this paper we discuss the issues relating the evaluation and reporting of security assurance of runtime systems. We first highlight the shortcomings of current initiatives in analyzing, evaluating and reporting security assurance information. Then, the paper proposes a set of metrics to help capture and foster a better understanding of the security posture of a system. Our security assurance metric and its reporting depend on whether or not the user of the system has a security background. The evaluation of such metrics is described through the use of theoretical criteria, a tool implementation and an application to a case study based on an insurance company network. 相似文献
18.
Giampaolo Bella 《International Journal of Information Security》2010,9(2):83-97
Conformity to prudent design principles is an established approach to protocol correctness although it is not free of limitations.
We term goal availability a design principle that is often implicitly followed, prescribing protocols to aim at principal-centric goals. Adherence
to a design principle is normally established through protocol analysis that is an evaluation of whether a protocol achieves
its goals. However, the literature shows that there exists no clear guidance on how to conduct and interpret such an analysis,
a process that is only left to the analyzer’s skill and experience. Goal availability has the desirable feature that its supporting
protocol analysis can be precisely guided by what becomes a principle of realistic analysis, which we call guarantee availability. It prescribes that the outcome of the analysis, which is the set of guarantees confirming the protocol goals, be practically
applicable by the protocol participants. In consequence, the guarantees must be based on assumptions that the principals have
the capacity to verify. Our focus then turns entirely to protocol analysis, because an analysis conforming to guarantee availability
signifies that the analyzed protocol conforms to goal availability. Existing analysis of (both classical and deployed) protocols
has been reconsidered with the aim of studying their conformity to guarantee availability. Some experiments clarify the relationships
between goal availability and the existing design principles, with particular reference to explicitness. Other experiments
demonstrate that boosting an analysis with guarantee availability generally makes it deeper, unveiling additional protocol
niceties that depending on the analyzer’s skills may remain overseen otherwise. In particular, an established claim about
a protocol (made using a well-known formal method) can be subverted. 相似文献
19.