版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、內(nèi)蒙古科技大學(xué)碩士學(xué)位論文基于Kerberos與X.509的網(wǎng)格認(rèn)證模型研究姓名:肖健申請(qǐng)學(xué)位級(jí)別:碩士專業(yè):控制理論與控制工程指導(dǎo)教師:譚躍生20080509內(nèi)蒙古科技大學(xué)碩士學(xué)位論文- 2 -AbstractGrid is information application service which serves users like a supercomputer by means ofusing geographically wi
2、dely distributed computation resources, storage resources, networkresources, software resources and information resources etc. Grid technologies have extensiveperspective and development scope, but researches concerning
3、it are still on the first step. There aremany key technologies which need to be solved. On one hand, the powerful functions of Gridtechnologies can bring great convenience to scientific researches,on the other hand, much
4、 attentionmust be given to the security of the grid while using the fast and convenient functions and services.Grid security is not only the first defense line, but also the most important defense line, so theauthenticat
5、ion technology receives the attention generally. Existing Grid security certificate modelsinclude: centralized CA (Certificate Authority) model, mufti-CA model and crossed certificatemodel. But these models have various
6、defects. While using centralized CA model or mufti CAmodel, managing certificates will be very complicated and the amount of data and update amountsare great by means of adopting general management mode of the centraliz
7、ed model. When adoptingcrossed certificate model, the selection of the path will arises.This thesis researches and designs a certificate model based on X.509 and Kerberos. In thismodel, terminal user certificate's pr
8、omulgation is similar with the management to the central model,some independent authentication center carries on issues, and goes upstream finally to a rootauthentication center, here name it the second-level trust terri
9、tory, has own certificate strategy andthe authentication mechanism in this trust territory, like X.509 authentication and Kerberosauthentication; In order to enable the different authentication mechanism between the grid
10、 territoryuser to be possible to visit mutually, composes a first-level trust territory the grid environment's insecond-level trust territory, the first-level trust territory does not participate in the terminal user
11、 andintermediate level CA certificate promulgation with the supervisory work, only carries on thecertificate to the second-level trust territory's root authentication center to issue and to manage,carries on the firs
12、t-level trust territory based on the X.509 PKI authentication.This model has designed grid isomerism domain authentication model based on Kerberos andthe X.509. This model including the security policy, the authenticatio
13、n agreement, the workingpattern and the module and the authentication technology's design, makes authentication moreconvenient and safe in grid isomerism territory.The authentication model has not only solved many qu
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 基于x.509的安全認(rèn)證系統(tǒng)的研究與實(shí)現(xiàn)
- 應(yīng)用層vpn模型和基于x.509規(guī)范的認(rèn)證模型
- 基于x.509標(biāo)準(zhǔn)的ca認(rèn)證中心設(shè)計(jì)與實(shí)現(xiàn)
- 基于pki、x.509證書的移動(dòng)代理安全認(rèn)證研究
- 基于x.509證書的pki身份認(rèn)證體系的研究與實(shí)現(xiàn)
- 基于x.509標(biāo)準(zhǔn)的ca認(rèn)證中心設(shè)計(jì)與實(shí)現(xiàn)(1)
- 電子政務(wù)中基于x.509的證書認(rèn)證中心的設(shè)計(jì)與分析研究
- 基于x.509標(biāo)準(zhǔn)的公鑰證書管理系統(tǒng)研究
- 基于ssl協(xié)議和x.509的安全web訪問(wèn)控制技術(shù)
- x.509證書和rbac在web中的應(yīng)用
- internet x.509 public key infrastructure subject identification method (sim)-
- 基于信任與零知識(shí)證明的Kerberos跨域認(rèn)證模型.pdf
- 基于Kerberos的身份認(rèn)證機(jī)制研究.pdf
- 基于Kerberos的RFID身份認(rèn)證研究與設(shè)計(jì).pdf
- 基于指紋認(rèn)證的Kerberos認(rèn)證系統(tǒng)的設(shè)計(jì).pdf
- Kerberos認(rèn)證系統(tǒng)的研究與改進(jìn).pdf
- 基于Kerberos的安全認(rèn)證模塊設(shè)計(jì)與實(shí)現(xiàn).pdf
- 基于GLOBUS的網(wǎng)格認(rèn)證授權(quán)模型研究.pdf
- 基于公鑰密碼的Kerberos認(rèn)證協(xié)議研究.pdf
- 基于WPKI的Kerberos身份認(rèn)證的應(yīng)用研究.pdf
評(píng)論
0/150
提交評(píng)論