期刊文献+

基于信任管理系统的P2P网络安全结构SAP2P

SAP2P :A Security Architecture for P2P Network Applications Based on Trust Management System
下载PDF
导出
摘要 P2P网络具有离散、动态和自治的特点.这些特点使得一些传统的安全技术并不能很好解决P2P网络认证、授权和保密通信等这些安全问题.本文设计了新的信任管理系统ExSPKI用于在P2P网络中建立信任关系,并以此为基础设计了新的安全结构SAP2P(Security Architecture of Peerto Peer Network),从而可以为P2P网络用户之间以及系统中安全功能模块之间建立有效的信任关系,为P2P网络奠定了安全基础,最后本文给出了SAP2P的参考实现. The P2P network and its applications have the characters of dynamic and self-management, so the classic technologies do not solve the security issues of P2P network such as authentication, authorization and secure communication appropriately. In this paper, we propose a new trust management system called ExSPKI to solve the problem of establishing trust relation. Based on ExSPKI, a security architecture SAP2P ( Security Architecture of Peer to Peer Network) is proposed to build the trust relation between the security modules and solves the related security issues. This paper describes definition in ExSPKI and the composition and the protocol of the SAP2P. An implantation is discussed finally.
出处 《电子学报》 EI CAS CSCD 北大核心 2005年第B12期2342-2347,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60373040) 国家863高技术研究计划(No.2003AA142150)
关键词 P2P网络 安全结构 信任管理系统 P2P network security architecture trust management system
  • 相关文献

参考文献16

  • 1Dejan S Milojicic, Vana Kalogeraki. Peer-to-peer computing[R]. HP Lab,2002.
  • 2Bordignon F, Tolosa G. G-nutella: distributed system for information storage and searching model description [DB/OL]. http ://www. gnutella. co. uk/library/pdf/papeffinal-gnutellaenglish, pdf,2001-08-1/2001-10-11.
  • 3Matt Blaze, Joan Feigenbaum, Jack Lacy. Decentralized trust management[A]. In Proceedings of the 1996 IEEE Symposium on Security and Privacy [ C ]. Oakland: IEEE Computer Society Press,1996. 164 - 173.
  • 4IETF RFC 2693, SPK1 certificate theory [ S ].
  • 5B Traversat, M Abdelaziz, M Duigou, J C Hugly, E Pouyoul, B Yeager. Project jxta virtual network[ DB/OL ]. http://www. jxta. org/project/www/docs/JXTAprotocols.pdf,2002-10-08/2002-11-01.
  • 6Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids [ A ]. In Proceedings of 5th ACM Conf on Computer and Communications Security[ C ]. New York: ACM Press, 1998.83 - 92.
  • 7D Kato. GISP: global information sharing protocol-a distributed index for peer-to-peer systems [ A ]. In Proceedings of 2nd International Conference on Peer-to-Peer Computing[ C ], Sweden: ACM Press ,2002.65 - 73.
  • 8A O Freier, P Karlton, P C Kocher. The SSL protocol version 3.0 [ DB/OL ]. http://wp. netscape. com/eng/ssl3/ssl-toc, html, 1996-03/2005-11.
  • 9Chen R, Yeager W Poblano. A distributed trust model for P2P networks[ R]. Sun Microsystem,2002.
  • 10D Clarke, J Elien, C Ellison, M Fredette, A Morcos, R L Rivest. Certificate chain discovery in SPKI/SDSI [ J ].Journal of Computer Security,2001,9 (4) :285 - 322.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部