[1]杨明慧[] [],刘孟占[],邹翔[][],等. 德国eID机制对我国网络身份管理的启示[J].计算机技术与发展,2014,24(07):157-161.
 YANG Ming-hui[][],LIU Meng-zhan[] ZOU Xiang[][],WANG Zhi-peng[][],et al. Reference of Germany eID Mechanism for China Network Identity Management[J].,2014,24(07):157-161.
点击复制

 德国eID机制对我国网络身份管理的启示()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年07期
页码:
157-161
栏目:
安全与防范
出版日期:
2014-07-10

文章信息/Info

Title:
 Reference of Germany eID Mechanism for China Network Identity Management
文章编号:
1673-629X(2014)07-0157-05
作者:
 杨明慧[1] [2]刘孟占[3]邹翔[1][2]汪志鹏[1][2]饶洁[3]
 1.公安部第三研究所;2.信息网络公安部重点实验室;3.同济大学 电子与信息工程学院,
Author(s):
 YANG Ming-hui[1][2]LIU Meng-zhan[3] ZOU Xiang[1][2]WANG Zhi-peng[1][2]RAO Jie[3]
关键词:
 电子身份标识网络身份管理身份认证隐私保护数据安全
Keywords:
 eIDnetwork identity managementidentity authenticationprivacy protectiondata security
分类号:
TP309.2
文献标志码:
A
摘要:
 网络身份管理已经成为电子商务、电子政务、社交网络等各类网络在线应用的基础。公民网络电子身份标识eID是网络上远程证明个人真实身份的权威性电子文件,是一种实现网络身份管理的有效手段。如何在进行有效的身份认证的同时又能兼顾保护用户隐私是当前网络身份管理中亟需解决的问题。首先概述了当前网络身份认证中存在的问题,然后针对德国eID机制在隐私保护、数据安全方面采取的措施进行了研究分析,最后给出了德国eID机制对我国网络身份管理的借鉴意义。
Abstract:
 Network identity management has become the base of on-line applications such as e-business,e-government and social net-work. Civil network electronic identity (eID) is authoritative electronic file to determine individual identity,which is an effective ap-proach to implement the network identity management. However,it is a problem to protect the client’ s private data when carrying out the identity management in the network. In this paper,some problems of traditional identity authentication methods are described first. Then a deep analysis of Germany eID mechanism is made,especially for privacy protection and data security. The results show that Germany eID mechanism has important reference for China network identity management.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(07):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(07):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(07):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(07):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(07):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(07):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(07):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(07):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(07):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(07):47.

更新日期/Last Update: 2015-03-16