首页 | 官方网站   微博 | 高级检索  
     

用TPM增强Kerberos协议的安全性
引用本文:刘平,池亚平,方勇. 用TPM增强Kerberos协议的安全性[J]. 计算机工程与设计, 2007, 28(18): 4351-4353
作者姓名:刘平  池亚平  方勇
作者单位:西安电子科技大学,陕西,西安,710071;北京电子科技学院,北京,100070;北京电子科技学院,北京,100070;北京工业大学,北京,100022;北京电子科技学院,北京,100070
摘    要:根据Kerberos协议基本原理和可信计算的特点,提出把TPM(可信平台模块)加入到Kerberos认证系统中,在用户请求认证的过程中对终端平台的完整性进行测量,并分析此平台的可信性,从而确保加入该Kerberos域的终端平台安全可靠.通过在Kerberos认证中心加入TPM增强Kerberos认证协议所信赖的可信第三方的安全性.这样,确保整个Kerberos认证系统安全可靠,并通过Kerberos的跨域认证实现基于Kerberos认证的可信网络.

关 键 词:Kerberos认证协议  可信计算  可信平台模块  可信网络  可信第三方
文章编号:1000-7024(2007)18-4351-03
修稿时间:2006-10-29

Improving kerberos protocol security with TPM
LIU Ping,CHI Ya-ping,FANG Yong. Improving kerberos protocol security with TPM[J]. Computer Engineering and Design, 2007, 28(18): 4351-4353
Authors:LIU Ping  CHI Ya-ping  FANG Yong
Abstract:It is presented that install trusted platform module (TPM) in the kerberos authentication system based on the characteristics of the kerberos protocol principle and trusted computing. The TPM measures the integrity of the terminal user's platform during the process of the user's authentication request. Then, the trust of the platform is analyzed. In this way, it is ensured that the platforms in this kerberos realm are safe and trusted. In addition, install trusted platform module in the center of kerberos authentication, which assures the security of the third trusted part. In this way, it is ensured that the whole kerberos authentication system is safe, and a trusted network will be realized with the technology of Kerberos cross-realm authentication.
Keywords:kerberos protocol  trusted computing  TPM  trusted network  trusted third party
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号