Dissertation > Excellent graduate degree dissertation topics show

Research on Authentication Architecture and Related Technologies of Information System

Author: PengShuangHe
Tutor: ShenChangXiang;HanZhen
School: Beijing Jiaotong University
Course: Applied Computer Technology
Keywords: Information Assurance Trusted Mechanism Application Enclave Boundary Single Sign on Proxy Proxy Signature Inter-domain Authentication Proxy Cryptography Trusted Authentication Device
CLC: TP309
Type: PhD thesis
Year: 2006
Downloads: 685
Quote: 9
Read: Download Dissertation


With the widespread application of information system, security issue becomes more and more important. Services such as identification and authentication, authority and access control, non-deniability, confidentiality and integrity are the key elements for the security of the information system. Among them, identification and authentication are the foundation for others.Research on information security has evolved from early-stage communication protection, information protection to information assurance worldwide. National Security Agency has proposed technical guidance IATF 3.0 (Information Assurance Technical Framework) for protecting information and information infrastructures in the United States. In China Shen Changxiang, a noted information security expert who is the academic member of Chinese academy of engineering, has put forward a "three vertical, three horizontal and two centers" assurance system for information system, which is a great guideline for the construction of secure information system.According to IATF3.0, attaining a robust information assurance posture means implementing policies, procedures, techniques, and mechanisms at all layers throughout the organization’s information infrastructure, i.e. defending the network and infrastructure, defending the enclave boundary, defending the computing environment, and supporting infrastructures. Under this background, the importance of the trustworthy of terminal operation platform is now widely recognized. With the simplicity of hardware architecture and the weakness of operation system and application software, personal computer platform is not a trusted system. One way to improve this is to check the integrity of computing platform. Trusted Computing Group i.e. TCG, tries to deal with this by introducing trusted mechanism into personal computer system. A hardware module, called Trusted Platform Module, must be embedded in the motherboard on computing platform according to specifications defined by TCG. TCG might prevent a breach of the perimeter from breaching the end-host control plane, but in reality constructing such a system remains a significant, open problem. This is especially difficult when grafting TCG onto existing, legacy

Related Dissertations

  1. Study and Design of Several Proxy Cryptographic Schemes,TN918.1
  2. The Analysis and Design of Certificateless Cryptographic Schemes and Proxy Cryptographic Schemes,TN918
  3. Continued fraction linear lower bound on the number of identity-based signature,TN918.1
  4. Research on Proxy Digital Signature Schemes,TN918.1
  5. Researches on Threshold Proxy Signature Schemes and Multi-level Proxy Signature Schemes,TN918.1
  6. Research and Application of Proxy Signature Based on Conic Curves over Z_n,TN918.1
  7. The Research of (t,n) Threshold Proxy Signature Based on Elliptic Curve Cryptosystem,TN918.1
  8. On the Study of Some New Digital Signature Scheme,TN918.1
  9. Study on Proxy Signature Based on Discrete Logarithm Problem,TP309
  10. Design and Analysis of Designated Verifier Signature,TN918.1
  11. Research on Threshold Proxy Signature,TN918.1
  12. Research on Known Identity-Based Digital Signature Scheme,TN918.1
  13. Proxy Signature and the Research of Its Applications,TN918.1
  14. The special proxy signature analysis and improvement,TN918.1
  15. A Fail-Stop Blind Proxy Signature and Its Application in Electronic Voting,TN918.2
  16. Research of Multi-digtal Signature Scheme Based on Elliptic Curve,TN918.1
  17. Research on Quantum Proxy Signature Scheme,TN918.1
  18. The Research of ID-based Signature,TN918.1
  19. Some special digital signature scheme analysis, design and applied research,TN918.1
  20. Research on Proxy Signature Schemes and Their Applications,TN918.1

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile