期刊文献+

网格环境下的基于行为的信任评估模型 被引量:14

A TRUST EVALUATION MODEL BASED ON BEHAVIORS IN GRID ENVIRONMENTS
下载PDF
导出
摘要 在网格环境中 ,信任管理是一个新颖而又重要的安全问题。本文对信任类型进行了形式化的定义 ,采用被评估者的行为作为信任评估的依据 ,引入信任域的概念来解决推荐经验在信任评估中的合成 ,并给出了评价机制。 Trust manage is new and important for security in grid environments.This paper formalizes trust class,evaluates trust based on the behaviors of the evaluated entity,introduces the concept of 'trust domain' to combine recommended experience,and provides the way of trust evaluation.
出处 《计算机应用与软件》 CSCD 北大核心 2005年第2期62-64,共3页 Computer Applications and Software
基金 国家自然科学基金资助项目 (60 1 730 2 6) 上海科委重大项目 (0 3DZ1 50 2 9) 上海高校网格技术E -研究院资助(2 0 0 30 1 - 1 )
关键词 因特网 信任管理 信任评估模型 网格 Grid Trust Behavior
  • 相关文献

参考文献9

  • 1徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 2卢震宇,戴英侠,郑江.基于认证中心的多级信任模型的分析与构建[J].计算机工程,2001,27(10):48-50. 被引量:3
  • 3M Blaze, J Feigenbanm and J Lacy, Decentralized mast management, Proceedings of the 17th Symposium on Security and Privacy, IEEE Computer Society Press, pp. 164 - 173,1996.
  • 4M Blaze, J Feigenbamn and J loannidis, The KeyNote Trust-Management System Version 2, RFC2704,1999.
  • 5I Foster, and C Kesselman, The Grid: Blueprint for a New Computing Infrastructure, Morgan-Kaufmann, 1999.
  • 6Diego Gambetta,Can we mast trust? Trust:Making and breaking cooperative relations, Gambetta, D(ed), Basil Blackwell, Oxford, 1990:217 - 237.
  • 7T Beth, M Boreherding, B Klein, Valuation of trust in open systems, In D Gollmann, editor, Computer Security ESORICS' 94, volume 875 of Lecture Notes in Computer Science, Springer Verlag, Berlin, 1994:3 - 18.
  • 8A Abdul-Rahman, S Hailes, A distributed trust model, Proceedings of the1997 New Security Paradigms Workshop, Cumbria, UK,ACM Press,pp.48-60.
  • 9Li Xiong, Ling Liu,A reputation-based mast model for peer-to-peer ecom-merce communities, E-Commerce, 2003. CEC 2003, IEEE International Conference on,24 - 27 June 2003,pp.275 - 284.

二级参考文献23

  • 1[1]Burr W B.Public Key Infrastructure Technical Specification: Part C Concept of Operations. 1998-09
  • 2[2]Adams C,Lloyd S.Understanding Public-key Infrastmcture:Concept,Standard ,and Deployment Consideration. 1999-05
  • 3[3]Ford W,Housley R, Polk W,et al.RFC 2459:Internet X.509 Public Kev Infrastructure Certificate and CRL Profile. 1999-01
  • 4Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 5Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 6Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 7Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 8Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 9Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 10Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.

共引文献114

同被引文献120

引证文献14

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部