According to the various security access methods applied to wireless local area network (WLAN), an approach to integrating WPA and WAPI is presented, which can make wireless terminals able to access WLAN expediently. ...
详细信息
According to the various security access methods applied to wireless local area network (WLAN), an approach to integrating WPA and WAPI is presented, which can make wireless terminals able to access WLAN expediently. With the related access information, this approach can recognize the network type, and then adaptively choose the corresponding protocol to access the network.
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to ...
详细信息
By using the Lagrange interpolation formula and the technology of signature of equality, a (k, n) threshold nominative proxy signature scheme is proposed, where an original signer delegates his (her) signing power to a proxy, who generates a nominative signature on behalf of the original signer and only k or more active verifiers in the n nominees (verifiers) nominated by the proxy signer can verify the signature signed by the proxy. If necessary, these (k or more) active nominees (verifiers) can prove its validity to a third party. In this scheme, the secret shares are generated and en- crypted by the original signer. At the same time, the ciphertexts of the secret shares are used as parts of the signature. Then, the secret shares need not be sent to the nominees (verifiers) secretly. The ordinary nominative proxy signature can be viewed as a (1, 1) threshold nominative proxy signature. The ordinary nominative proxy signature can be viewed as a special case of a (k, n) threshold nominative proxy signature. According to the security analysis of this paper, it is found that our scheme is secure against a proxy signing key forgery attack and existential forgery on an adaptive chosen message attack.
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega...
详细信息
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delegation side, then newly searches, finds other chain discovery until the end. It solves the negative credentials, compared with the time and space complicated degree of the original arithmetic, the algorithm is more simple and shortcut.
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
详细信息
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer ...
详细信息
PMI (privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC (Role-based Access control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is deseribed in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.
Confidentiality and integrity are two essential factors in a secure information *** reliability extended security model combines BLP and B1BA models to satisfy the above security requirements,and it uses the concept o...
详细信息
Confidentiality and integrity are two essential factors in a secure information *** reliability extended security model combines BLP and B1BA models to satisfy the above security requirements,and it uses the concept of reliability to describe the security state of a running *** also applies the flexible security rules to meet confidentiality and integrity requirements of different applications.
We present a robust disaster recovery system model according to the requests of disaster recovery talent of a key e-government project of China. The model strengthens the safe communication ability and guarantees the ...
详细信息
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge an...
详细信息
ISBN:
(纸本)1424406048
For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, merge and partition events. In the scheme, the numbers of rounds and messages are close to the lower bounds of those for dynamic group key management, and the length of messages and computation costs are less than those of the existing schemes. Furthermore, this scheme provides forward secrecy, backward secrecy and key independence
To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algori...
详细信息
To use role-based access control (RBAC) in wireless network is difficult than that in wired network. RBAC needs to search relative tables to get the user's permissions. We present an access control judgment algorithm which bases on artificial neural network (ANN). The algorithm reduces the data transmission using bit string to express roles and permissions. The algorithm employs set theory to represent roles and their inheritance hierarchy, as well as conflicted permissions. It uses selected roles as input vectors and the matching permissions which contain no conflict as the output vectors to train the ANN. Then it uses the trained ANN to compute directly users' permissions when the system is under running condition, instead of searching tables. That improves the efficiency of access control. The algorithm is simple and efficient, which makes it easy to be realized in wireless networks
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an en c...
详细信息
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an en crypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it.
暂无评论