首页 | 本学科首页   官方微博 | 高级检索  
     检索      

UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P
作者姓名:孙道清  蒲芳  曹奇英
作者单位:College of Information Sciences and Technology,Donghua University,College of Mathematics and Computer Science,Anhui Normal University
基金项目:Supported by the Ministry of Education in China .(No. 104086)
摘    要:Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure (PKI) methods. The limited computing resources, the disconnection network, the classification requirements of identification, the requirement of trust transfer and cross identification, the bidirectional identification, the security delegation and the privacy protection etc are all these unsolved problems. In this paper, UCIMssp, a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer (P2P) is presented. SPKI- based authorization is exploited in UCIMssp to solve the above problems in the smalbscale ubiquitous computing environment. The DHT and flooding technology of P2P overlay network over the Intemet is expanded to solve the routing search in the large-scale ubiquitous computing environment. The architecture of ubiquitous computing environment, the validation of identification requisition, the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper. The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.

关 键 词:识别系统  网络安全  SPKI/SDSI  预防措施

UCIMssp: Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P
SUN Dao-qing,PU Fang,CAO Qi-ying.UCIMssp:Ubiquitous Computing Identification Mechanism Based on SPKI/SDSI and P2P[J].Journal of Donghua University,2008,25(4):475-483.
Authors:SUN Dao-qing  PU Fang  CAO Qi-ying
Institution:1. College of Information Sciences and Technology,Donghua University,Shanghai 201620,China;College of Mathematics and Computer Science,Anhui Normal University,Wuhu 241000,China
2. College of Information Sciences and Technology,Donghua University,Shanghai 201620,China
Abstract:Ubiquitous computing systems typically have lots of security problems in the area of identification supply by means of classical Public Key Infrastructure(PKI)methods.The limited computing resources,the disconnection network,the classification requirements of identification,the requirement of trust transfer and cross identification,the bidirectional identification,the security delegation and the privacy protection etc are all these unsolved problems.In this paper,UCIMssp,a new novel ubiquitous computing identification mechanism based on SPKI/SDSI and Peer-to-Peer(P2P)is presented.SPKI-based authorization is exploited in UCIMssp to solve the above problems in the small-scale ubiquitous computing environment.The DHT and flooding technology of P2P overlay network over the Internet is expanded to solve the routing search in the large-scale ubiquitous computing environment.The architecture of ubiquitous computing environment,the validation of identification requisition,the identification authorization processes and the identification supply processes etc of UCIMssp are described in the paper.The performance analysis shows that UCIMssp is a suitable security solution used in the large-scale ubiquitous computing environment.
Keywords:ubiquitous computing  identification mechanism  UCIMssp  SPKI/SDSI  Peer-to-Peer  security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号