2023年全國(guó)碩士研究生考試考研英語(yǔ)一試題真題(含答案詳解+作文范文)_第1頁(yè)
已閱讀1頁(yè),還剩67頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

1、內(nèi)蒙古科技大學(xué)碩士學(xué)位論文基于Kerberos與X.509的網(wǎng)格認(rèn)證模型研究姓名:肖健申請(qǐng)學(xué)位級(jí)別:碩士專業(yè):控制理論與控制工程指導(dǎo)教師:譚躍生20080509內(nèi)蒙古科技大學(xué)碩士學(xué)位論文- 2 -AbstractGrid is information application service which serves users like a supercomputer by means ofusing geographically wi

2、dely distributed computation resources, storage resources, networkresources, software resources and information resources etc. Grid technologies have extensiveperspective and development scope, but researches concerning

3、it are still on the first step. There aremany key technologies which need to be solved. On one hand, the powerful functions of Gridtechnologies can bring great convenience to scientific researches,on the other hand, much

4、 attentionmust be given to the security of the grid while using the fast and convenient functions and services.Grid security is not only the first defense line, but also the most important defense line, so theauthenticat

5、ion technology receives the attention generally. Existing Grid security certificate modelsinclude: centralized CA (Certificate Authority) model, mufti-CA model and crossed certificatemodel. But these models have various

6、defects. While using centralized CA model or mufti CAmodel, managing certificates will be very complicated and the amount of data and update amountsare great by means of adopting general management mode of the centraliz

7、ed model. When adoptingcrossed certificate model, the selection of the path will arises.This thesis researches and designs a certificate model based on X.509 and Kerberos. In thismodel, terminal user certificate's pr

8、omulgation is similar with the management to the central model,some independent authentication center carries on issues, and goes upstream finally to a rootauthentication center, here name it the second-level trust terri

9、tory, has own certificate strategy andthe authentication mechanism in this trust territory, like X.509 authentication and Kerberosauthentication; In order to enable the different authentication mechanism between the grid

10、 territoryuser to be possible to visit mutually, composes a first-level trust territory the grid environment's insecond-level trust territory, the first-level trust territory does not participate in the terminal user

11、 andintermediate level CA certificate promulgation with the supervisory work, only carries on thecertificate to the second-level trust territory's root authentication center to issue and to manage,carries on the firs

12、t-level trust territory based on the X.509 PKI authentication.This model has designed grid isomerism domain authentication model based on Kerberos andthe X.509. This model including the security policy, the authenticatio

13、n agreement, the workingpattern and the module and the authentication technology's design, makes authentication moreconvenient and safe in grid isomerism territory.The authentication model has not only solved many qu

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論