首页 | 本学科首页   官方微博 | 高级检索  
     

一种专用可信网络
引用本文:余彦峰, 刘毅, 张书杰, 段立娟. 一种专用可信网络[J]. 北京工业大学学报, 2006, 32(11): 1032-1036.
作者姓名:余彦峰  刘毅  张书杰  段立娟
作者单位:1. 北京工业大学,计算机学院,北京,100022
2. 海军计算技术研究所,北京,100841
基金项目:北京市重点建设基金,北京市优秀人才培养基金
摘    要:为实现一个可信的专用网络,结合可信计算技术,利用组合公钥算法将可信终端的信任链引入专用网络.采用闪存密钥技术弥补了组合公钥算法易受共谋攻击的缺点,建立了,专用可信网络模型,以密码管理和安全管理为中心构建了综合安全防护系统,实现了专用网络的安全性、真实性、可控性和可靠性.

关 键 词:可信网络  可信计算  组合公钥  安全性
文章编号:0254-0037(2006)11-1032-05
收稿时间:2005-10-28
修稿时间:2005-10-28

Private Trusted Network
YU Yan-feng, LIU Yi, ZHANG Shu-jie, DUAN Li-juan. Private Trusted Network[J]. Journal of Beijing University of Technology, 2006, 32(11): 1032-1036.
Authors:YU Yan-feng  LIU Yi  ZHANG Shu-jie  DUAN Li-juan
Affiliation:1. College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China; 2.Naval Institute of Computing Technology, Beijing 100841, China
Abstract:In order to realize a trusted private network,firstly,trusted computing technologies are utilized. Then with the use of combined public key algorithm(CPK),the trust chain from trustworthy terminal can be led into private networks,and the USB Key technique is used to overcome the weakness of CPK.Finally, with the cryptogram management and security management as the center,a comprehensive secure defensive system is constructed,and a trusted network model is established to realize security,authenticity,controlla- bility and reliability of private networks.
Keywords:trusted network  trusted computing  combined public key (CPK)  security
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《北京工业大学学报》浏览原始摘要信息
点击此处可从《北京工业大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号