Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2017-04
Add to Favorite Get Latest Update

Security Access Model in Pervasive Computing Environment

ZHOU Yan-wei;YANG Bo;ZHANG Wen-zheng;School of Computer Science,Shaanxi Normal University;Science and Technology on Communication Security Laboratory;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences;  
Because of the popularity and the change of communication mode for mobile terminals and in order to meet the security access demand of pervasive computing environment,we present a security access model for pervasive computing environment which contains three kinds of access mechanisms: local service domain registration, local domain access and cross-domain access, and the specific work processes of the above access mechanisms are introduced at the same time.The security proof shows that our proposal is provably secure in the CK security model and has superiority in anonymity, security and efficiency,which make it more suitable for pervasive computing environment.
【Fund】: 国家自然科学基金(No.61572303 No.61272436 No.61402275);; 中国科学院信息工程研究所信息安全国家重点实验室基金(No.2015-MS-10);; 保密通信重点实验室基金(No.9140C110206140C11050);; 中央高校基本科研业务费专项资金(No.GK201504016);; 陕西师范大学优秀博士论文基金(No.X2014YB01)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 6 Hits
1 XU Ming-di;ZHANG Huan-guo;ZHANG Fan;YANG Lian-jia;Wuhan Digital and Engineering Institute;The Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education;Communication Engineering School,Hanzhou Dianzi University;;Survey on Chain of Trust of Trusted System[J];电子学报;2014-10
2 TAN Liang1,2,CHEN Ju1,ZHOU Ming-tian3(1.College of Computer,Sichuan Normal University,Chengdu,Sichuan 610068,China;2.Institute of Computing Technology of Chinese Academy of Sciences,Beijing 100190,China;3.School of Computer Science & Engineering,University of Electronic Science & Technology of China,Chengdu,Sichuan 610054,China);Trustworthiness Evidence Collection Mechanism of Running Dynamic Environment of Trusted Terminal[J];电子学报;2013-01
3 LUO Chang-yuan,HUO Shi-wei,XING Hong-zhi(Electronic Technology Institute,Information Engineering University,Zhengzhou 450004,China);Identity-based cross-domain authentication scheme in pervasive computing environments[J];通信学报;2011-09
4 HOU Hui-fang1,2,JI Xin-sheng2,LIU Guang-qiang1(1.College of Information Science and Engineering,Henan University of Technology,Zhengzhou 450001,China; 2.National Digital Switching System Engineering & Technological R&D Center,Zhengzhou 450002,China);Identity-based anonymity authentication protocol in the heterogeneous wireless network[J];通信学报;2011-05
5 JIANG Qi1)MA Jian-Feng1)LI Guang-Song2)MA Zhuo1)1)(Key Laboratory of Computer Networks and Information Security of Ministry of Education,Xidian University,Xi'an 710071)2)(Department of Information Research,Information Engineering University,Zhengzhou 450002);Security Integration of WAPI Based WLAN and 3G[J];计算机学报;2010-09
6 LI Xing-hua1,MA Jian-feng1,2,MA Zhuo1 (1.Key Laboratory of Computer Networks and Information Security,Ministry of Education,Xidian University,Shaanxi,Xi'an 710071,China; 2.College of Computer Technology and Automation,Tianjin Polytechnic University,Tianjin 300160,China);The Canetti-Krawczyk Model Under the Trusted Computation[J];电子学报;2009-01
【Co-citations】
Chinese Journal Full-text Database 8 Hits
1 XU Ming-di;ZHANG Huan-guo;ZHANG Fan;REN Zheng-wei;Wuhan Digital and Engineering Institute;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education;School of Mathematics and Computer Science,Wuhan Polytechnic University;;Authorization Restriction-Based Platform Configuration Attestation[J];电子学报;2017-06
2 ZHOU Yan-wei;YANG Bo;ZHANG Wen-zheng;School of Computer Science,Shaanxi Normal University;Science and Technology on Communication Security Laboratory;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences;;Security Access Model in Pervasive Computing Environment[J];电子学报;2017-04
3 Hou Weichao;Li Jing;Liu Haijie;Zheng Chi;Datang Gohighsec(Zhejiang) Information Technology Co.,Ltd;;A Data Protection Method Based on Trusted Computing in Distributed Storage[J];信息安全研究;2017-04
4 ZHU Wen-qiang;ZHONG Yuan-sheng;XU Jun;School of Information Management,Jiangxi University of Finance and Economics;Modern Economics & Management College,Jiangxi University of Finance and Economics;;Trustworthy Service Recommendation Method Based on Social Trust[J];小型微型计算机系统;2017-03
5 ZHANG Xin;YANG Xiaoyuan;ZHU Shuaishuai;YANG Haibing;Department of Electronic Technology,Engineering College of Chinese People's Armed Police Force;Key Laboratory of Network & Information Security under People's Armed Police,Engineering College of Chinese People's Armed Police Force;Institute of Information Security,Engineering College of Chinese People's Armed Police Force;;Trusted access authentication protocol for mobile nodes in Internet of things[J];计算机应用;2016-11
6 ZHANG Xin;YANG Xiaoyuan;ZHU Shuaishuai;Department of Electronic Technology, Engineering University of Armed Police Force;Institute of Information Security, Engineering University of Armed Police Force;;Trusted and anonymous authentication protocol for mobile networks[J];计算机应用;2016-08
7 ZHOU Yan-wei;YANG Bo;ZHANG Wen-zheng;School of Computer Science,Shaanxi Normal University;Science and Technology on Communication Security Laboratory;State Key Laboratory of Information Security,Institute of Information Engineering,Chinese Academy of Sciences;;Controllable and Anonymous Roaming Protocol for Heterogeneous Wireless Network[J];电子学报;2016-05
8 CHEN Lu;QIAO Wei-di;Institute of Information and Communication, Global Energy Interconnection Research Institute;Sieyuan Electric Co., Ltd.;;Research on Smart Grid Terminal Trusted Access Technology Based on User Behaviors Under Energy Interconnection Environment[J];电力信息与通信技术;2016-04
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 CHANG De-xian1,2,3,FENG Deng-guo1,QIN Yu1,ZHANG Qian-ying1,2(1.Institute of Software,ChineseAcademy of Sciences,Beijing 100190,China;2.Graduate University of Chinese Academy of Sciences,Beijing 100049,China;3.3rd Institute,PLA Information Engineering University,Zhengzhou 450004,China);Analyzing the trust chain of trusted virtualization platform based on the extended LS~2[J];通信学报;2013-05
2 ZHOU Cong-Hua JU Shi-Guang (School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013);A Petri Net Based Approach to Covert Information Flow Analysis[J];计算机学报;2012-08
3 TAN Liang1),2) MENG Wei-Ming1) ZHOU Ming-Tian3)1)(College of Computer,Sichuan Normal University,Key Laboratory of Visualization in Scientific Computing and Virtual Reality of Sichuan,Chengdu 610066)2)(Institute of Computing Technology,Chinese Academy of Sciences,Beijing 100190)3)(School of Computer Science & Engineering,University of Electronic Science & Technology of China,Chengdu 610054);A New Method of Performance Estimate of Direct Anonymous Attestation Scheme in TCG[J];计算机学报;2012-07
4 ZHANG Fan1,CHEN Shu2,SANG Yong-xuan1,YOU Lin1(1.College of Communication School,Hangzhou Dianzi University,Hangzhou 310018,China; 2.Department of Computer Science,Huazhong Normal University,Wuhan 430079,China);Noninterference model for integrity[J];通信学报;2011-10
5 Li Bo,Li Jianxin,Hu Chunming,Wo Tianyu,and Huai Jinpeng (School of Computer Science and Engineering,Beihang University,Beijing100191);Software Integrity Verification Based on VMM-Level System Call Analysis Technique[J];计算机研究与发展;2011-08
6 Zhang Fengzhe,Chen Jin,Chen Haibo,and Zang Binyu(Parallel Processing Institute,Fudan University,Shanghai 201203);Lifetime Privacy and Self-Destruction of Data in the Cloud[J];计算机研究与发展;2011-07
7 QIN Xi1,CHANG Chao-wen1,SHEN Chang-xiang2,GAO Li1(1.Institute of Electronic and Technology,Information Engineering University,Zhengzhou,Henan 450004,China;2.Beijing University of Technology,Beijing 100022,China);Research on Trusted Terminal Computer Model Tolerating Untrusted Components[J];电子学报;2011-04
8 FENG Deng-Guo,ZHANG Min+,ZHANG Yan,XU Zhen(State Key Laboratory of Information Security,Institute of Software,The Chinese Academy of Sciences,Beijing 100190,China);Study on Cloud Computing Security[J];软件学报;2011-01
9 QIU Gang1,WANG Yu-lei2,ZHOU Li-hua1 ( 1. The CNIS Key Lab. of the Education Ministry,Xidian Univ. ,Xi’an 710071,China; 2. Network Info. Center,Nanyang Inst. of Technol. ,Nanyang 473004,China);Noninterference-based Integrity Measurement Model[J];四川大学学报(工程科学版);2010-04
10 XU Ming-Di ZHANG Huan-Guo ZHAO Heng LI Jun-Lin YAN Fei(Wuhan Digital and Engineering Institute,Wuhan 430074)(School of Computer,Wuhan University,Wuhan 430072)(Key Laboratory of Aerospace Information Security and Trust Computing,Ministry of Education,Wuhan 430072);Security Analysis on Trust Chain of Trusted Computing Platform[J];计算机学报;2010-07
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved