期刊文献+

History-based trust negotiation model 被引量:1

History-based trust negotiation model
下载PDF
导出
摘要 Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper introduces the concept of visiting card, and presents a history-based trust negotiation (HBTN) model. HBTN creates an account for a counterpart at the first negotiation and records valid credentials that the counterpart disclosed during each trust negotiation in his historical information base (HIB). For the following negotiation, no more credentials need to be disclosed for both parties. HBTN speeds up subsequent negotiations between the entities that interact with each other frequently without impairing the privacy preservation. Trust negotiation (TN) is an approach to establish trust between strangers through iterative disclosure of digital credentials. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper introduces the concept of visiting card, and presents a history-based trust negotiation (HBTN) model. HBTN creates an account for a counterpart at the first negotiation and records valid credentials that the counterpart disclosed during each trust negotiation in his historical information base (HIB). For the following negotiation, no more credentials need to be disclosed for both parties. HBTN speeds up subsequent negotiations between the entities that interact with each other frequently without impairing the privacy preservation.
出处 《Journal of Shanghai University(English Edition)》 CAS 2009年第2期150-154,共5页 上海大学学报(英文版)
基金 supported by the National Natural Science Foundation of China (Grant No.60403027)
关键词 trust negotiation (TN) subsequent negotiation access control grid compute network security trust negotiation (TN), subsequent negotiation, access control, grid compute, network security
  • 相关文献

参考文献1

二级参考文献20

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2Chadwick D. W. , Otenko A.. The PERMIS X. 509 role based privilege management infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, California, USA, 2002, 135-140
  • 3Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the IEEE Symposium on Securityand Privacy, Oakland, CA, USA, 1996, 164-173
  • 4Li N. , Mitchell J. C. , Winsborough W. H.. Design of a Role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 2002, 114-130
  • 5Clarke D. , Ellen J. E. , Ellison C. , Fredette M. , Morcos A. ,Rivest R. L.. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 6Winsborough W. H. , Seamons K. E. , Jones V.E.. Automated trust negotiation. In: Proceedings of the DARPA Information Survivability Conference and Exposition, 2000, 88-102
  • 7Yu T. , Winslett M. , Seamons K.E.. Supporting structured credentials and sensitive policies through interoperahle strategies for automated trust negotiation. ACM Transactions on Information and System Security(TISSEC), 2003, 6(1): 1-42
  • 8Sun H., Zhu Y., Hu C., Huai J., Liu Y., Li J.. Early experience of remote and hot service deployment with trustworthiness in CROWN grid. In: Proceedings of the 6th International Workshop on Advanced Parallel Processing Technologies,Hong Kong, China, 2005, 301-312
  • 9Foster I. , Kesselman C. , Tuecke S.. The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 2001,15(3) : 200-222
  • 10Thompson M. R., Essiari A., Mudumbai S.. Certificatebased authorization policy in a PKI environment. ACM Transactions on Information and System Security(TISSEC), 2003, 6(4): 566-588

共引文献17

同被引文献3

  • 1WINSBOROUGH W H,SEAMONS K E,JONES V E.Automated trust negotiation[C]//Proceedings DARPA Information Survivability Conference and Exposition.Hilton Head,SC,USA:IEEE Press,2000:88-102.
  • 2SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].IEEE Computer,1996,29(2):38-47.
  • 3李立新,陈伟民,黄尚廉.强制访问控制在基于角色的安全系统中的实现[J].软件学报,2000,11(10):1320-1325. 被引量:48

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部