期刊文献+

开放网络中信任模型的研究 被引量:2

Research of Trust Model in Open Network
下载PDF
导出
摘要 针对开放网络的特点,提出并定义了适合开放网络的信任模型——混合信任模型。在此基础上设计了介绍人协议,通过介绍人 协议,互不相识的网络用户可以找到合适的介绍人建立信任,从而完成需要确保可信性的事务。 This paper proposes a generic trust model based hybrid structure which can meet open network characteristic. Then it designs an introducer protocol that is used by entities to find an appropriate introducer to build trust relationship with target he does not know, and then they can perform transactions that must be sure in security circumstance.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第4期144-145,171,共3页 Computer Engineering
关键词 开放网络 信任模型 介绍人协议 Open network Trust model Introducer protocol
  • 相关文献

参考文献4

  • 1Dunn J. The Concept of Trust in the Politics of John Locke. In:Philosophyin History, Rorty R, Schneewind J B, Skinner Q(Eds.),Cambridge University Press, Cambridge, 1984
  • 2Jsang A. The Right Type of Trust for Distributed Systems. New Security Paradigms '96 Workshop, 1996
  • 3Cao Yuanda, Ning Yupeng. A Model of Trust Management in Open Network Environment. Journal of Beijing Institute of Technology,2003,12(3)
  • 4International Telecommunication Union. Recommendation X.509 -Information Technology-Open Systems Interconnection-The Directory:Authentication Framework. 1997-08

同被引文献35

  • 1宁宇鹏,曹元大.开放网络环境中信任的自动建立[J].计算机工程,2004,30(16):124-125. 被引量:5
  • 2王丹,于戈.P2P系统模型研究[J].计算机工程,2005,31(4):128-130. 被引量:29
  • 3刘玉龙,曹元大.分布网络环境主观信任模型研究[J].北京理工大学学报,2005,25(6):504-508. 被引量:19
  • 4张春瑞,江帆,徐恪.面向对等网络应用的信任与名誉模型[J].清华大学学报(自然科学版),2005,45(10):1436-1440. 被引量:10
  • 5郭磊涛,杨寿保,王菁,周金洋.P2P网络中基于矢量空间的分布式信任模型[J].计算机研究与发展,2006,43(9):1564-1570. 被引量:16
  • 6[4]Grandison T,Sloman M.A Survey of Trust in Internet Applications.IEEE Communications Surveys and Tutorials,2000,3(4):2~16.
  • 7[5]Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.In:Proc.of the 17th Symposium on Security and Privacy.IEEEComputer Society Press,1996:164~ 173.
  • 8[6]Stephen Weeks.Understanding trust management systems.In:Proc.of the 2001 IEEE Symposium on Security and Privacy,Oakland,California.IEEEComputer Society,2001:94~ 105.
  • 9[7]Marti S,Giuli T J,Lai K,et al.Mitigating routing misbehavior in mobile ad hoc networks.In:Proc.of the 6th Int.Conference on Mobile Computing and Networking,ACM Press,2000:255~265.
  • 10[8]Zhang Yongguang,Lee W.Intrusion detection in wireless ad-hoc networks.In:Proc.of the 6th Annual Int.Conference on Mobile Computing and Networking,ACM Press,2000:275~283.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部