期刊文献+

基于概率和条件逻辑的PKI信任模型推理 被引量:3

PKI Trust Model Analysis Based on Probabilistic Model and Conditional Predicate Calculus Logic
下载PDF
导出
摘要 提出一种基于概率和条件谓词逻辑来表示和推导PKI信任模型的方法.该方法用3个二元条件谓词表示不同个体之间的关系,并给出了实体认证规则、信任规则和信任扩展规则,对信任度定义了一个概率模型,该模型能反映约束条件如何影响信任度.概率模型加条件谓词逻辑能够对一个PKI信任模型进行更精确的描述. A conditional predicate logic and probabilistie model are proposed for representing and reasoning about PKI trust model. Three predicates are defined to represent the relationships among the different entities, the reasoning rules about Authenticity, Trust extension, and Certification are given. A probabilistie model is given to measure the degree of confidence among these entities, this model can tell how these constraints affect on the confidence. Probabilistie model and conditional predicate can precisely express a PKI trust model.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第1期69-71,共3页 Journal of Chinese Computer Systems
基金 电子科学基金项目(514500101DZ02)资助.
关键词 公开密钥基础设施 信任模型 谓词逻辑 PKI trust model predicate logic
  • 相关文献

参考文献6

  • 1Maurer U. Modeling a public-key infrastructure[C]. European Symp Res Computer Security (ESORICS'96), 1996, 325-350.
  • 2Bakkali H El, Kaitouni B I. A logic-based reasoning about PKI trust model [C]. Sixth IEEE Symposium on Computers and Communications, 2001, 42-48.
  • 3ISO/IEC9594-8/ITU-T Recommendation X. 509. Information technology, OSI-The directory: authentication framework[S].1997.
  • 4Chokhani S, Ford W. Internet X 509 public key infrastructure certificate policy and certification practices framework[S]. RFC 2527-1999.
  • 5Pretty good privacy user's guide, version7. 0[EB/OL]. Distributed With the PGP Software, 2001.
  • 6Housley R, Ford W, Polk W et al. Internet X 509 public key infrastructure, Certificate and CRL profile[S]. RFC-1999, 2459.

同被引文献16

  • 1薛锐,冯登国.安全协议的形式化分析技术与方法[J].计算机学报,2006,29(1):1-20. 被引量:61
  • 2Ueli Maurer. Modelling a public-key infrastructure [ C ]. Proc. 1996 European Symposium on Research in Computer Security ( ES- ORICS' 96), E. Bertino (Ed.), Lecture Notes in Computer Sci- ence, Berlin: Springer-Verlag, 1996, 1146 : 325-350.
  • 3Hanane El Bakkali, Bahia Idrissi Kaitouni. A logic-based reasoning about PKI trust model[ C]. Sixth IEEE Symposium on Computers and Communications, 2001 : 42-48.
  • 4Hanane E1 Bakkali, Bahia Idrissi Kaitouni. A predicate calculus logic for the PKI trust model analysis [ C ]. IEEE International Symposium on Network Computing and Applications, 2001 : 368- 371.
  • 5Zhang Ming-de, Zheng Xue-feng, Lv Shu-wang, et al. Improved approach on modeling and reasoning about PKI/WPKI [ C ]. WiCOM 2010, September 2010 : 1-4.
  • 6Burrows M, Abadi M, Needham R. A logic of authentication[J]. ACM Transactions in Computer Systems, 1990, 8( 1 ) : 18-36.
  • 7Fan Kai, Li Hui, Wang Yue. Security analysis of the kerberos pro- tocol using BAN logic [ C ]. IAS 2009, Auguest 2009, 2 : 467- 470.
  • 8Weiser M.The computer for the twenty -first century[J].Scientific American,1991,265 (3):94-104.
  • 9Apostolos M.Secure and distributed knowledge management in pervasive environments[C]//Proceedings International Conference on Pervasive Services 2005.ICPS'05,2005:79-87.
  • 10Mi nami K,Kotz D.Secure context-sensitive authorization[C]//Proceedings of the 3rd IEEE Int'l Conf on Pervasive Computing and Communications (PerCom 2005),2005.

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部