期刊文献+

一种AN逐跳认证模型的设计

Design of hop-by-hop authentication model for AN
在线阅读 下载PDF
导出
摘要 在主动网中,授权用户具有了以往只有系统管理员才具有的网管权利,授权用户能够管理配置主动节点的资源。主动数据包中携带了能对网络节点资源进行访问的程序,它们在很大程度上可以对资源进行分配、修改等操作,所有这些都可能使网络受到恶意程序和有缺陷代码的攻击或影响,因此,主动网络的安全问题是其能够得以推广应用的关键。对AN主体或实体的有效认证是AN安全实施的前提保障。由于主动网络环境与传统网络环境的差异性,在主动网中对网络实体及网络主体进行认证将面临更多的挑战。在深入研究分析AN安全认证技术的基础上,设计实现了一个AN逐跳认证模型。 InAN, the authorized user has the management right ofnetwork which used to be possessed only by the system administrator,and can administrating and control the resources of the active nodes. The active packets with executable codes can access the resources of the nodes, and can allocate and modify the resources in most degree. All of these may bring the dangers from the malicious or defect codes. As a result, active networking (AN) Security is of critical importance to the success of active networking. The efficient authentication of principals or entities of AN is the foundation to implement security for AN. Since the differences between the active networks and passive networks, the authentication of principals or entities in active networks will meet more challenging. After the authentication technologies for AN are analyzed deeply, a hop-by-hop authentication model for AN is presented.
出处 《计算机工程与设计》 CSCD 北大核心 2006年第15期2887-2888,2891,共3页 Computer Engineering and Design
关键词 主动网 逐跳 安全 认证 主动报文封装协议 安全联合 active networking (AN) hop-by-hop, security authentication ANEP security association
  • 相关文献

参考文献8

  • 1温蜀山,陈远,李乐民,孙海荣.主动网应用及发展状况分析[J].电子科技大学学报,2000,29(4):387-391. 被引量:3
  • 2陈宝莲,温蜀山,孙海荣,李乐民.主动网技术在网络管理中的应用[J].电子科技大学学报,2000,29(4):392-396. 被引量:1
  • 3Prashant Chandra,Allan Fisher,Corey Kosak,et al.Darwin:Customizable resource management for value-added network services[C].Sixth International Conference on Network Protocols,IEEE Computer Society,1998.177-188.
  • 4Psounis K.Active networks:Application,security,safety,and architectures[J].IEEE Comm Surveys,1999,2(1):445-457.
  • 5RFC 1825.Security architecture for the internet protocol[S].1995.
  • 6Scott Alexander D,Bob Braden.Active network encapsulation protocol[S].RFC Draft,1997.
  • 7Maughan D,Schertler M,Scheneider M,et al,Inetnet security association and key management protocol (ISIKMP)[C].RFC 2408,1998.
  • 8杨仕平,熊光泽,桑楠.安全关键系统的防危性技术研究[J].电子科技大学学报,2003,32(2):164-168. 被引量:9

二级参考文献10

  • 1[1]Nancy G L. Software safety in embedded computer systems[J]. Communications of the ACM, 1991, 34(2): 34-46
  • 2[2]Anderson E, Katwijk J V, Zalewski J. New method of improving software safety in missioncritical real-time systems[C]. Proc. 1999 International System Safety Conference, Orlando, Florida, 1999
  • 3[3]Diller A Z. An introduction to formal methods[M]. Ed.2, John Wiley&Sons, New York, NY, 1994
  • 4[4]Wika K J, Knight J C. On the enforcement of software safety policies[C]. Proceedings of the Tenth Annual Conference on Computer Assurance(COMPASS), Gaithersburg, MD, 1995:83-93
  • 5[5]Wika K J. Safety kernel enforcement of software safety policies[D]. Ph.D. dissertation, Department of Computer Science, University of Virginia, Charlottesville, VA, 1995
  • 6[6]Chiba S A. Metaobject protocol for C++ in ACM conference on object-oriented programming, systems, languages and applications[C]. Austin, TX, 1995:285-299
  • 7Goldszmidt G,IEEE Comm Mag,1998年,32卷,6期,66页
  • 8岑贤道,网络管理协议及应用开发,1998年
  • 9许都,李乐民.ATM网络中长相关业务排队性能的分析[J].电子科技大学学报,1998,27(4):357-361. 被引量:8
  • 10李立忠,李乐民.截短RS/混合Ⅱ型ARQ在衰落信道上的性能分析[J].电子科技大学学报,1999,28(1):1-5. 被引量:5

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部