首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于Kerberos 5受限代理的实现与应用
引用本文:刘蔚林.基于Kerberos 5受限代理的实现与应用[J].怀化学院学报,2003,22(2):62-66.
作者姓名:刘蔚林
作者单位:零陵学院,计算机系,湖南,永州,425006
摘    要:讨论了在Kerberos 5鉴别系统中受限代理的实现和应用问题 为了在网络环境下实现分布式授权和记账机制 ,首先介绍了受限代理模型 ,分析了基于公开密钥和对称密钥机制的鉴别系统实现受限代理的方法 ,特别强调了在Kerberos 5中实现受限代理的相关问题 由于鉴别、授权和记账服务之间存在紧密联系 ,最后将受限代理应用于分布式授权和记账服务中 ,提出相应授权和记账机制

关 键 词:受限代理  授权  记账  鉴别
文章编号:1671-9743(2003)02-0062-05
修稿时间:2003年1月10日

The Implementation and Application of Restricted Proxy Based on Kerberos 5
LIU Wei-lin.The Implementation and Application of Restricted Proxy Based on Kerberos 5[J].Journal of Huaihua University,2003,22(2):62-66.
Authors:LIU Wei-lin
Abstract:The issue of implementation and applicaton of restricted proxy based on Kerberos 5 is discussed in this paper. In order to realize distributed authorization and accounting in nework environment, the model of restricted proxy is introduced first. It is analyzed that the implementation methods of restricted proxy based on authentication system which using public key cryptography and symmetrical key cryptography, and problems to realize proxy in Kerberos 5 and emphasized. As authorization and accounting are closely related to authentication, the restricted proxy is applied in the area of authorization and accounting last, which provides a vehicle for implementing authorization and accounting mechanisms in distributed systems.
Keywords:restricted proxy  authorization  accounting  authentication
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号