期刊文献+

一个开放环境中信任链发现算法的设计与分析 被引量:2

A Trust Chain Discovery Algorithm for Open Environment
下载PDF
导出
摘要 信任管理是解决开放环境安全问题的新方法,而信任链发现算法是信任管理系统的核心内容,与其所处理凭证的存储方式及凭证所表达的授权形式有关.基于给定的与dRBAC基本一致的授权形式,给出了一个凭证存储于签发者的信任链发现算法.主要考虑到签发者能够方便地保存签发的凭证以及对其有效性负责,凭证存储于签发者,能避免凭证的分发以及有效性验证所产生的网络通信开销,并有效防止凭证所包含的敏感信息的泄露.与dRBAC系统比较,基于此算法实现的信任管理系统具有较为简单的结构.另外,实验结果表明该算法执行效率较高.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期72-77,共6页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展规划基金项目(2002CB312002) 国家"八六三"高技术研究发展计划基金项目(2005AA113160, 2005AA113030,2005AA119010) 国家自然科学基金项目(60233010,60403014) 江苏省自然科学基金项目(BK2006712)
  • 相关文献

参考文献12

  • 1徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 2[2]M Blaze,J Feigenbaum,J Lacy.Decentralized trust management.The 17th Symposium on Security and Privacy,Oakland,1996
  • 3[3]A Abdul-Rahman,S Hailes.A distributed trust model.In:Proc of the 1997 New Security Paradigms Workshop.New York:ACM Press,1998.48-60
  • 4徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. 被引量:69
  • 5[5]Alberto Frenandes,Evangelos Kotsovinos,Sven /String,et al.Pinocchio:Incentives for honest participation in distributed trust management.In:Proc of the 2nd Int'l Conf on Trust Management.Berlin:Springer-Verlag,2004.63-77
  • 6[6]M Blaze,J Ioannidis,A Keromytis.Trust management for IPSec.ACM Trans on Information and System Security,2002,5(2):95-118
  • 7[7]S Foley.Using trust management to support transferable hash-based micropayments.In:Proc of the 7th Int'l Financial Cryptography Conf.Berlin:Springer-Verlag,2003.1-14
  • 8[8]T B Quillinan,B C Clayton,S N Foley.GridAdmin:Decentralising grid administration using trust management.In:Proc of the 3rd Int'l Symposium on Parallel and Distributed Computing (ISPDC).Piscataway,NJ:IEEE Press,2004
  • 9[9]D Clarke,J Elien,C Ellison,et al.Certificate chain discovery in SPKI/SDSI.Journal of Computer Security,2001,9(4):285-322
  • 10[10]Ninghui Li,John C Mitchell.RT:A role-based trust management framework.In:Proc of the 3rd DARPA Information Survivability Conf and Exposition (DISCEX III).Los Alamitos:IEEE Computer Society Press,2003.201-212

二级参考文献28

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 10Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.

共引文献173

同被引文献14

引证文献2

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部