Font Size: a A A

Research On Authentication Architecture And Related Technologies Of Information System

Posted on:2007-11-27Degree:DoctorType:Dissertation
Country:ChinaCandidate:S H PengFull Text:PDF
GTID:1118360212468350Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the widespread application of information system, security issue becomes more and more important. Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system. Among them, identification and authentication are the foundation for others.Research on information security has evolved from early-stage communication protection, information protection to information assurance worldwide. National Security Agency has proposed technical guidance IATF 3.0 (Information Assurance Technical Framework) for protecting information and information infrastructures in the United States. In China Shen Changxiang, a noted information security expert who is the academic member of Chinese academy of engineering, has put forward a "three vertical, three horizontal and two centers" assurance system for information system, which is a great guideline for the construction of secure information system.According to IATF3.0, attaining a robust information assurance posture means implementing policies, procedures, techniques, and mechanisms at all layers throughout the organization's information infrastructure, i.e. defending the network and infrastructure, defending the enclave boundary, defending the computing environment, and supporting infrastructures. Under this background, the importance of the trustworthy of terminal operation platform is now widely recognized. With the simplicity of hardware architecture and the weakness of operation system and application software, personal computer platform is not a trusted system. One way to improve this is to check the integrity of computing platform. Trusted Computing Group i.e. TCG, tries to deal with this by introducing trusted mechanism into personal computer system. A hardware module, called Trusted Platform Module, must be embedded in the motherboard on computing platform according to specifications defined by TCG. TCG might prevent a breach of the perimeter from breaching the end-host control plane, but in reality constructing such a system remains a significant, open problem. This is especially difficult when grafting TCG onto existing, legacy...
Keywords/Search Tags:Information Assurance, Trusted Mechanism, Application Enclave Boundary, Single Sign on, Proxy, Proxy Signature, Inter-domain Authentication, Proxy Cryptography, Trusted Authentication Device
PDF Full Text Request
Related items