期刊文献+

基于综合信任评估的自适应动态认证方法 被引量:1

Adaptive Dynamic Authentication Method Based on Comprehensive Trust Evaluation
在线阅读 下载PDF
导出
摘要 随着信息技术的快速发展,网络与信息安全问题越发显著,业务复杂化和攻击常态化等问题日益凸显,因此单一的身份鉴别模式存在身份信息易被窃取、无法防范内部用户违规操作等问题,已不能满足身份认证的安全要求。针对现有认证体制中,认证方式及认证策略设定后无法自适应调整的问题,提出了一种基于综合信任评估的自适应动态认证方法,以持续对终端和用户进行信任分析。基于利用所提方法得到的持续自适应风险与综合信任评估结果,可以动态调整认证策略和认证强度,且调整过程可以自动完成,无需人为干预和控制,能够解决认证策略一旦设定就无法自适应调整的问题,具有安全、方便和高效的优点。 With the rapid development of information technology,the issues of network and information security are becoming more and more prominent,and problems such as business complexity and attacks normalization are increasingly significant.The single identity authentication mode has the problems of identity information theft and the inability to prevent the illegal behavior of internal users,etc.,and can no longer meet the security requirements of identity authentication.To address the problem that the authentication methods and policies cannot be adaptively adjusted after they are set in the existing authentication system,this paper proposes an adaptive dynamic authentication method based on comprehensive trust evaluation in order to continuously conduct trust analysis on terminals and users.Based on the continuous adaptive risk and comprehensive trust evaluation results obtained by utilizing the proposed method,the authentication policy and authentication strength can be dynamically adjusted,and the adjustment process can be completed automatically without human intervention and control,which can solve the problem that authentication policies cannot be adaptively adjusted once they are set,and it has the advantages of security,convenience and high efficiency.
作者 丁文超 韦荻山 薛艳珠 房冬丽 余双波 DING Wenchao;WEI Dishan;XUE Yanzhu;FANG Dongli;YU Shuangbo(No.30 Institute of CETC,Chengdu Sichuan 610041,China;Unit 63921 of PLA,Beijing 100080,China)
出处 《通信技术》 2024年第9期942-948,共7页 Communications Technology
关键词 身份认证 认证策略 信任评估 动态认证 自适应 identity authentication authentication policy trust evaluation dynamic authentication self-adaption
作者简介 丁文超(1991-),男,硕士,工程师,主要研究方向为网络与信息安全;韦荻山(1978-),男,硕士,助理研究员,主要研究方向为网络与信息安全;薛艳珠(1978-),女,硕士,工程师,主要研究方向为网络与信息安全;房冬丽(1990-),女,硕士,工程师,主要研究方向为网络与信息安全;余双波(1982-),男,硕士,高级工程师,主要研究方向为网络与信息安全。
  • 相关文献

参考文献8

二级参考文献54

  • 1刘洋宇,侯整风.基于椭圆曲线的门限身份认证方案[J].计算机工程与设计,2005,26(10):2858-2859. 被引量:6
  • 2ABHILASHA BHARGAV-SPANTZEL,ANNAC.SQUICCIARINI,AND ELISA BERTINO. Trust Negotiation in Identity Management[J]. Security & Privacy, 2007,5(2) :55 - 63.
  • 3Rajarajan Sampath, Deepak Goel. RATING: Rigorous Assessment of Trust in Identity Management[C]//Proceedings of the First International Conference on Availability, Reliability and Security. IEEE COMPUTER SOCIETY, 2006 : 10 -19.
  • 4Altmann, J. Sampath, R. UNIQUE: A User-Centric Framework for Network Identity Management [C]//Network Operations and Management Symposium. 10th IEEE/IFIP, 10.1109/NOMS. 2006:495 -506.
  • 5Daeseon Choi,Seung-Hun Jin and Hyunsoo Yoon. Trust Management for User-Centric Identity Management on the Internet[C]// ISCE 2007, IEEE International Symposium. Consumer Electronics, 2007:1-4.
  • 6M. Burmester, Y. Desmedt, Hiroshi Doi, et al. A Structured E1Gamal-Type Multisignature Scheme[J]. PKC2000, 2000,LNCS1751: 466-483.
  • 7Mitsuru Tada. An Order-Specified Multisignature Scheme Secure Against Active Insider Attacks[C]//L. Batten, J. Seberry. ACISP2002. Melbourne: Springer Berlin/Heidelberg 2002: 57-106.
  • 8Gangishetti R, choudary Gorantla M, Lal Das M, et al. Identity Based Multisignatures[J]. lOS press, 2006, 17(2) : 177-186.
  • 9Bart De Decker, Frank Piessens, Jan Smith, et al. Advances in Network and Distributed Systems Security[M]. Boston :Springer, 2002.
  • 10C. C. Chang, E.-H. Lu, S.-F. Pon, andJ.-Y. Lee, Applying Harn- Kiesler multisignature scheme to electronic document systems [C]//Proc. National Information Security Conf.., R.O.C., 1995: 35-38.

共引文献102

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部