期刊文献+

一个基于信任管理的分布式访问控制系统的设计与实现 被引量:3

The Design and Implementation of a Distributed Access Control System Based on Trust-Management
下载PDF
导出
摘要 开放协同软件环境下软件系统的安全问题极大地影响了软件系统的开发与应用。信任管理是解决开放协同软件环境下安全问题的一个新思想。本文在分析了开放协同软件系统安全问题的基础上,针对现存信任管理系统的不足,设计并实现了一个适用于开放环境下的基于信任管理的分布式访问控制系统DACBTM。该系统采用信任度量的方法对软件实体间的信任关系进行评估。本文在系统实现的同时给出了一个经过改进与扩充的信任发现算法,该算法对于安全信息不足的情况给出了合理的解决方案。 The security problems of the open coordination software environment make great influence on the development and application of the software systems. Trust management is a new approach to solve these security problems effectively. By analyzing the security problems of the open coordination software systems and the limitations of the traditional trust management systems, this paper designs and implements a distributed access control system, DACBTM, based on trust management, which is suitable for the application system in the open coordination software environment. The system can evaluate the trust relationship between software entities by the approach of trust-evaluation. We also present an improved, effective algorithm for the collection of the security information, which provides a reasonable mechanism to solve the shortness of the security information in the open coordination software environment.
出处 《计算机科学》 CSCD 北大核心 2005年第8期226-229,248,共5页 Computer Science
基金 本文由973项目(No.2002CB312002) 863项目(No.2002AA1160101 No.2001AA113110) 国家自然科学基金(No. 60273034 No.60233010) 江苏省自然科学基金和高技术项目(No.BK2002203 No.BK2002409 No.BG2001012)资助
关键词 开放协同环境 信任 信任管理 信任评估 信任链 信任管理系统 访问控制系统 分布式 设计 软件系统 Open cooperation environment, Trust, Trust-management, Trust-evaluation, Trust link
  • 相关文献

参考文献7

  • 1Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management. In:Proc. of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy,Oakland,CA, May 1996. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
  • 2Blaze M, Feigenbaum J, Ioannidis J, et al. The KeyNote trustmanagement system ,version 2. IETF RFC 2704,Sept. 1999.
  • 3Li N, Mitchell J C, Winsborough W H. Design of a role-based trust-management framework. In: Proc. of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society, 2002.
  • 4Li Ninghui,Winsborough W H, Mitchell J C. Distributed credential chain discovery in trust management(extended abstract). In:Proc. of the Eighth ACM Conference on Computer and Communication Security(CCS-8), ACM Press,Nov. 2001. 156~165.
  • 5徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. 被引量:69
  • 6徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 7Freudenthal E, Pesin T, Port L, et al. dRBAC: Distributed rolebased access control for dynamic coalition environments. In:Proc. of the 22nd Intl. Conf. on Distributed Computing Systems (ICDCS02), 2002.

二级参考文献28

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 10Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.

共引文献173

同被引文献66

  • 1龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 2张煜,张文燚,李先贤,怀进鹏.多自治域协同环境中群组通信的安全访问控制[J].计算机研究与发展,2005,42(9):1558-1563. 被引量:4
  • 3李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 4陈颖,杨寿保,郭磊涛,申凯.网格环境下的一种动态跨域访问控制策略[J].计算机研究与发展,2006,43(11):1863-1869. 被引量:21
  • 5Nejdl W,Olmedilla D,Winslett M. PeerTrust: Automated trust negotiation for peers on the semantic Web//Proc. of the Workshop on Secure Data Management in a Connected World (SDM 2004). LNCS 3178. Springer-Verlag,2004:118-132
  • 6朱贤.多域环境下基于信任管理的访问控制研究.PhD.Thesis.2006
  • 7Denker G, Millen J, Miyake Y. Cross-domain access control via PKIffProceeding of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY. 02)[C]. IEEE Press, 2002
  • 8Piromruen S,Joshi J B D. An RBAC Framework for Time Constrained Secure. Interoperation in Multi-domain Environment// IEEE Workshop on Object-oriented Real-time. Databases (WORDS-2005). 2005 : 36-45
  • 9Dawson S, Qian S, Samarati P. Providing Security and Interoperation of Heterogeneous Systems//Distributed and Parallel Databases. 2000,8 : 119-145
  • 10Qian X, Lunt T F. A MAC Policy Framework for Multilevel Relational Databases//IEEE Trans. Knowledge and Data Eng. 1996,8(1):3-15

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部