Font Size: a A A

The Design And Realization Of Rights Management Infrastructure Pmi

Posted on:2006-04-11Degree:MasterType:Thesis
Country:ChinaCandidate:T ChenFull Text:PDF
GTID:2208360152497379Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Along with the rapid development of network and communication technologies, Internet has already been an important part of our society. Based on Internet, a virtual society is growing and expanding. Being perfected of network technologies and infrastructures has provided support of technologies and hardware to this virtual society. With the popularization of Internet, network applications especially E-Business and E-Government become important activities in Internet. Network security become a problem we cannot ignore because its importance in network applications. We need provide and discriminate our identity and privileges in order to ensure the security of network interaction. However, it isn't easy for the individual or organizations to have their identity and privileges testified in this virtual society. PKI(Public Key Infrastructure) imitate the third-party authentication system of our society and become the third-party authentication system of network. PKI use public key certificate as a carrier, resolving the issue of trust in network well. It can register both identity information and privileges information. But in PKI application, people found that identity and privileges have many different attributes, especially about the period of validity. Privileges vary frequently as the variety of environment while identity is stable comparatively. Binding both in a common certificate not only goes against effective management of identity and privileges, but also brings big amount of work to certificate authority because the frequent updates of certificate. Along with network applications'popularization, the contradiction between the permanence of identity and the impermanence of privileges becomes more and more marked...
Keywords/Search Tags:Network security, X.509 attribute certificate, PMI, PKI, RBAC, RFC, Role based authorization model
PDF Full Text Request
Related items