首页 | 本学科首页   官方微博 | 高级检索  
     

成长性身份认证
引用本文:唐权华,金炜东. 成长性身份认证[J]. 网络安全技术与应用, 2004, 21(12): 27-29
作者姓名:唐权华  金炜东
作者单位:西南交通大学电气工程学院,四川,610031
摘    要:传统身份认证过程中所依据的主要是用户口令等相对固定的信息,本文提出了利用用户的系统行为信息进行身份认证的成长性身份认证的概念。与现有的身份认证机制相比,成长性身份认证可以解决密钥分发时的管理员漏洞,使侦听与监视、重放攻击等难以得手,有利于入侵检测,适用于对身份认证安全性要求较高的系统。

关 键 词:成长性  身份认证  网络安全

Growable Authentication
Tang Quanhua Jin Weidong Dept.ofElectric Engineering,Southwest Jiaotong University,Sichuan. Growable Authentication[J]. Net Security Technologies and Application, 2004, 21(12): 27-29
Authors:Tang Quanhua Jin Weidong Dept.ofElectric Engineering  Southwest Jiaotong University  Sichuan
Affiliation:Tang Quanhua Jin Weidong Dept.ofElectric Engineering,Southwest Jiaotong University,Sichuan 610031
Abstract:Relatively fixed information like password is mainly depended on in traditionalmethods of authentication while a new conceptofauthentication, which using information ofthe users behaviourin the system to authenticate, called Growable Authentication, is lodged in this paper. Compared withauthentication method nowadays,Growable Authentication could resolve the security problem with administrator when distributing the keys.Itmakes it harderto interception or watch, or replay an authentication. It is in favour of detecting inbreak, in point in the systems wich needs high security.
Keywords:Growable  Authentication  security
本文献已被 CNKI 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号