版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、內(nèi)蒙古科技大學碩士學位論文基于Kerberos與X.509的網(wǎng)格認證模型研究姓名:肖健申請學位級別:碩士專業(yè):控制理論與控制工程指導教師:譚躍生20080509內(nèi)蒙古科技大學碩士學位論文- 2 -AbstractGrid is information application service which serves users like a supercomputer by means ofusing geographically wi
2、dely distributed computation resources, storage resources, networkresources, software resources and information resources etc. Grid technologies have extensiveperspective and development scope, but researches concerning
3、it are still on the first step. There aremany key technologies which need to be solved. On one hand, the powerful functions of Gridtechnologies can bring great convenience to scientific researches,on the other hand, much
4、 attentionmust be given to the security of the grid while using the fast and convenient functions and services.Grid security is not only the first defense line, but also the most important defense line, so theauthenticat
5、ion technology receives the attention generally. Existing Grid security certificate modelsinclude: centralized CA (Certificate Authority) model, mufti-CA model and crossed certificatemodel. But these models have various
6、defects. While using centralized CA model or mufti CAmodel, managing certificates will be very complicated and the amount of data and update amountsare great by means of adopting general management mode of the centraliz
7、ed model. When adoptingcrossed certificate model, the selection of the path will arises.This thesis researches and designs a certificate model based on X.509 and Kerberos. In thismodel, terminal user certificate's pr
8、omulgation is similar with the management to the central model,some independent authentication center carries on issues, and goes upstream finally to a rootauthentication center, here name it the second-level trust terri
9、tory, has own certificate strategy andthe authentication mechanism in this trust territory, like X.509 authentication and Kerberosauthentication; In order to enable the different authentication mechanism between the grid
10、 territoryuser to be possible to visit mutually, composes a first-level trust territory the grid environment's insecond-level trust territory, the first-level trust territory does not participate in the terminal user
11、 andintermediate level CA certificate promulgation with the supervisory work, only carries on thecertificate to the second-level trust territory's root authentication center to issue and to manage,carries on the firs
12、t-level trust territory based on the X.509 PKI authentication.This model has designed grid isomerism domain authentication model based on Kerberos andthe X.509. This model including the security policy, the authenticatio
13、n agreement, the workingpattern and the module and the authentication technology's design, makes authentication moreconvenient and safe in grid isomerism territory.The authentication model has not only solved many qu
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 基于x.509的安全認證系統(tǒng)的研究與實現(xiàn)
- 應用層vpn模型和基于x.509規(guī)范的認證模型
- 基于x.509標準的ca認證中心設計與實現(xiàn)
- 基于pki、x.509證書的移動代理安全認證研究
- 基于x.509證書的pki身份認證體系的研究與實現(xiàn)
- 基于x.509標準的ca認證中心設計與實現(xiàn)(1)
- 電子政務中基于x.509的證書認證中心的設計與分析研究
- 基于x.509標準的公鑰證書管理系統(tǒng)研究
- 基于ssl協(xié)議和x.509的安全web訪問控制技術(shù)
- x.509證書和rbac在web中的應用
- internet x.509 public key infrastructure subject identification method (sim)-
- 基于信任與零知識證明的Kerberos跨域認證模型.pdf
- 基于Kerberos的身份認證機制研究.pdf
- 基于Kerberos的RFID身份認證研究與設計.pdf
- 基于指紋認證的Kerberos認證系統(tǒng)的設計.pdf
- Kerberos認證系統(tǒng)的研究與改進.pdf
- 基于Kerberos的安全認證模塊設計與實現(xiàn).pdf
- 基于GLOBUS的網(wǎng)格認證授權(quán)模型研究.pdf
- 基于公鑰密碼的Kerberos認證協(xié)議研究.pdf
- 基于WPKI的Kerberos身份認證的應用研究.pdf
評論
0/150
提交評論