首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于主机标识的访问控制模型研究
引用本文:陈伟,王艳涛,张书钦.基于主机标识的访问控制模型研究[J].通信技术,2009,42(3):206-208.
作者姓名:陈伟  王艳涛  张书钦
作者单位:黑龙江科技学院,黑龙江,哈尔滨,150027
基金项目:黑龙江省青年科学基金 
摘    要:身份认证和访问控制是Internet应用的重要方面,传统的实施方案通常针对于特定的应用,也不能用于普适计算环境下的移动终端。文中提出了一个新的访问控制模型,利用了由IETF定义的主机标识协议(HIP),并扩展了HIP基本交换过程来实现对用户的认证,并通过客户端主机标识和用户标识的绑定认证来建立主机和用户的绑定关系,从而实现对用户访问请求的判断。

关 键 词:互联网  访问控制  安全  主机标识协议

Host Identity based Access Control Model
CHEN Wei,WANG Yan-tao,ZHANG Shu-qin.Host Identity based Access Control Model[J].Communications Technology,2009,42(3):206-208.
Authors:CHEN Wei  WANG Yan-tao  ZHANG Shu-qin
Institution:(Heilongjiang Science and Technology Institute, Harbin Heilongjiang 150027, China)
Abstract:Identity authentication and access control are the most important aspects for Internet applications The traditional implementation schemes are generally application-specific, and not suitable for roaming terminals inapervasivecomputingenvironment. This paper presentsanewaccess control model. It utilizes the Host Identity Protocol (HIP) defined by IETF, and extends the HIP Basic exchange, thus to achieve authentication of user identity. With the extended exchange, the binding-authentication of the Host Identity and User Identity of the client is realized, and a relationship between the host and the user is establised.
Keywords:Internet  access control  security  host identity protocol
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号