期刊文献+

自动信任协商抗攻击能力分析 被引量:1

Analysis of the Power of Automated Trust Negotiation Against Attacks
下载PDF
导出
摘要 自动信任协商是一种通过逐步暴露证书和访问控制策略以确立协商双方信任关系的方法.与任何接入因特网的开放系统一样,自动信任协商很容易遭受各方面的攻击,如拒绝服务、窃听、隐私截取等.通过分析自动信任协商对系统的需求,指出自动信任协商易遭受攻击的环节,给出自动信任协商对常见攻击的抵制方法,以及自动信任协商中各类协商技术抗攻击的原理.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期13-17,共5页 Journal of Computer Research and Development
基金 国家自然科学基金重大专项基金项目(90412010) 国家自然科学基金项目(60503040)
  • 相关文献

参考文献8

  • 1[1]W H Winsborough,N Li.Protecting sensitive attributes in automated trust negotiation.In:J B Michael ed.Proc of ACM Workshop on Privacy in the Electronic Society.New York:ACM Press,2002.102-113
  • 2[2]K E Seamons,M Winslett,T Yu,et al.Requirements for policy languages for trust negotiation.In:J B Michael ed.Proc of the 3rd IEEE Intel Workshop on Policies for Distributed Systems and Networks.Los Alamitos,CA:IEEE Computer Society Press,2002.68-79
  • 3[3]E Bertino,E Ferrari,A Squicciarini.Trust negotiations:Concepts,systems and languages.In:IEEE Symposium on Int'l Network Security.Los Alamitos,CA:IEEE Computer Society Press,2004.27-34
  • 4[4]T Yu.Dynamic trust establishment in open systems:[Ph D dissertation].Chicago,DA:Department of Computer Science,University of Illinois,2003
  • 5[5]J E Holt,R Bradshaw,K E Seamons,et al.Hidden credentials.In:S Jajodia,P Samarati,P F Syverson,eds.Proc of the 2nd ACM Workshop on Privacy in the Electronic Society.New York:ACM Press,2003.1-8
  • 6[6]T Yu,M Winslett.A unified scheme for resource protection in automated trust negotiation.In:B Chris ed.IEEE Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society Press,2003.245-257
  • 7[7]N Li,W Du,D Boneh.Oblivious signature-based envelope.In:B Elizabeth ed.Proc of the 22nd ACM Symposium on Principles of Distributed Computing.New York:ACM Press,2003.182-189
  • 8[8]J Li,N Li.OACerts:Oblivious attribute certificates.In:Y F Han ed.Proc of the 3rd Conf on Applied Cryptography and Network Security.New York:ACM Press,2003.108-121

同被引文献29

  • 1杨秋伟,洪帆,郑明辉,廖俊国.自动信任协商中的推理攻击分析[J].计算机科学,2007,34(7):76-79. 被引量:1
  • 2Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation[C] ∥Proc.of DARPA Information Survivability Conference and Exposition.Piscataway,New Jersey:IEEE Press,2000:88-102.
  • 3Lee A J,Winslett M,Basney J,et al.The Traust Authorization Service[J].ACM Transactions on Information and System Security,2008,11(2):1-33.
  • 4Skogsrud H,Motahari N H R,Benatallah B,et al.Modeling trust negotiation for web services[J].IEEE Computer,2009,42(2):54-61.
  • 5Ryutov T,Zhou L,Neuman C,et al.Adaptive Trust Negotiation and Access Control[C] ∥Proc.of the Tenth ACM Symposium on Access Control Models and Technologies.Stockholm,Sweden,2005.
  • 6Squicciarini A,BertinolE,Ferrari E,et al.PP-Trust-X:A System for Privacy Preserving Trust Negotiations[J].ACM Transactions on Information and System Security (TISSEC).New York:ACM press,2007,10:1-48.
  • 7Lee A J,Winslett M.Enforcing Safety and Consistency Constraints in Policy-bBased Authorization Systems[J].ACM Transactions on Information and System Security,New York:ACM press,2007,9:1-30.
  • 8Dean D,Stubblefield A.Using Client Puzzles to Protect Tls[C] ∥Annual USENIX Security Symposium.Washington,DC,2001.
  • 9Wang X,Reiter M.Defending Against Denial-of-Service Attacks with Puzzle Auctions[C] ∥IEEE Symposium on Security and Privacy.Berkeley,CA,2003.
  • 10Li J,Li N,Wang X,et al.Denial of Service Attacks and Decentralized Trust Management[C] ∥Securecomm and Workshops.2006:1-12.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部