网际安全技术构架:基于标识鉴别的可信系统(英文版)

网际安全技术构架:基于标识鉴别的可信系统(英文版)
作 者: 南相浩
出版社: 电子工业出版社
丛编项:
版权说明: 本书为出版图书,暂不支持在线阅读,请支持正版图书
标 签: 网络配置与管理
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

  南相浩,现任北京大学兼职教授和中国民生银行顾问等职务,长期从事密码学、信息安全和信息安全系统研究工作,是中国著名密码学专家。他是《网络安全技术概论》著作的作者,是《银行行为监管》和《银行行为控制》著作的副主笔。他是CPK密钥管理算法的提出者。

内容简介

CPK Cryptosystem changes ordinary elliptic curve public key into an identity-based public key with self-assured property. Self-assured public key can advance the authentication logic from object-authenticating \belief logic\ to entity-authenticating \trust logic\. Self-assured public key system and trust logic of authentication composes the key technique of cyber security. The construction of trust connecting,computing,transaction,logistics,counter-forgery and network management will be the main contents of the next generation of information security. Readers benefited from this book will be researchers and professors, experts and students, developers and policy makers, and all other who are interested in cyber security.

图书目录

Contents FOREWORD 4 CONTENTS 7 PART ONE 18 AUTHENTICATION TECHNIQUE 18 CHAPTER 1 19 BASIC CONCEPTS 19 1.1 PHYSICAL WORLD AND DIGITAL WORLD 19 1.2 A WORLD WITH ORDER AND WITHOUT ORDER 20 1.3 SELF-ASSURED PROOF AND 3RD PARTY PROOF 22 1.4 CERTIFICATION CH...

131 12.1 GENERAL DESCRIPTION 131 12.2 ELF FILE 131 12.3 LINUX SECURITY MODULE (LSM) FRAMEWORK 132 12.4 IMPLEMENTATION 133 PART FIVE 135 TRUST CONNECTING 135 CHAPTER 13 136 PHONE TRUST CONNECTING 136 13.1 MAIN TECHNOLOGIES 136 13.2 CONNECTING PROCEDURE ...