期刊文献+

对等网中一种基于SAML的委托认证方案 被引量:1

A SAML-based Entrusted Authentication Scheme for P2P Networks
下载PDF
导出
摘要 对P2P环境中的信任问题进行了分析和讨论,以SAML规范为蓝本,设计了一种在P2P环境中进行信任传递和身份确认的委托认证机制,为解决完全分布式计算环境中的信任缺失问题探索了一条新的途径。 This paper analyses the problem of trust management in P2P environment, and puts forward an entrusted authentication scheme to pass down trust among peers and to verify identities of each other. This scheme is a novel approach to solve the problem of loss of trust in purely distributed P2P environment.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第6期173-175,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2003AA142070)
关键词 P2P SAML 信任管理 委托认证 P2P 5AML Trust management Entrusted authentication
  • 相关文献

参考文献5

  • 1Resnick P,Zeckhauser R,Friedman E,et al.Reputation Systems[J].Communications of the ACM,2000,43(12):45-48.
  • 2Li Xiong,Liu Ling.Peer Trust:Supporting Reputation-based Trust for Peer-to-peer Electronic Communities[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843-857.
  • 3Richardson M,Agrawal R,Domingos P.Trust Management for the Semantic Web[C].Proc.of 2^nd International Semantic Web Conference,Florida,2003.
  • 4Milgram S.The Small World Problem[J].Psychology Today,1967,1(1):60-67.
  • 5Watts D J.Collective Dynamics of Small World Networks[J].Nature,1998,393(6):440-442.

同被引文献10

  • 1范宏生,叶震,侯保花.基于公钥密码体制的Kerberos协议的改进[J].计算机技术与发展,2006,16(4):224-227. 被引量:8
  • 2Wierzbicki A, Zwierko A, Kotulski Z. Authentication with controlled anonymity in P2P systems[C]//Proceedings of the Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'05 ). Washington, DC, USA: IEEE Computer Society, 2005 : 871 - 875.
  • 3Lu Li, Han Jinsong, Liu Yunhao, et al. Pseudo Trust: Zero -Knowledge Authentication in Anonymous P2Ps[J]. IEEE Transactions on Parallel And Distributed Systems, 2008, 19 (10) : 1325 - 1337.
  • 4Takeda A, Hashimoto K, Kitagata G,et al. A New Authentication Method with Distributed Hash Table for P2P Network[C]//22nd International Conference on Advanced Informarion Networking and Applications- Workshops. Okinawa: [s. n. ]. 2008:483 - 488.
  • 5Merkle R C. Secure Communications over In.secure Channels[ J ]. Communications of the ACM, 1978,21 (4) : 294 - 299.
  • 6Seo Dong Hwi, Sweeney P. Simple Authenticated Key Agrcement Algorirhm[J ]. Electronics Letters, 1999,35 (13) : 1073 - 1074.
  • 7Lin Iuon- Chang, Chang Chin- Chen, Hwang Min- Shiang. Security Enhancement for the Simple Authentication Key Agreement Algorithm[C]//24th Ann. Int. Computer Software and Application Conference. Taipei, Taiwan: [s. n. ]. 2000-113- 115.
  • 8蒋毅,史浩山,赵洪钢.基于分级Merkle树的无线传感器网络广播认证策略[J].系统仿真学报,2007,19(24):5700-5704. 被引量:10
  • 9周洲,黄永峰,李星.P2P网络的节点安全认证[J].东南大学学报(自然科学版),2007,37(A01):100-104. 被引量:6
  • 10冯新泉,黎忠文.P2P中基于无证书的认证及密钥协商协议[J].计算机技术与发展,2009,19(2):165-168. 被引量:5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部