期刊文献+

基于属性的信任协商模型 被引量:3

Model of attribute-based trust negotiation
下载PDF
导出
摘要 在研究现有信任协商解决方案的基础上,提出了一种基于属性的信任协商模型.在该模型中,将所有的对象看作为实体,并将每个实体与一对应的证书绑定,有效保证资源的合法性,避免了非授权用户对系统的访问.给出了模型的体系结构,描述了用户访问资源的流程,设计了用户的属性证书和资源的策略证书,并从安全、效率、扩展性等方面对模型进行了可行性分析.分析表明,模型具有单点登录、PULL模式访问资源、用户隐私保护、访问控制策略保护、易于实现的特点. On the basis of existing solutions to trust management, an attribute-based confidence negotiation model was proposed. Every object, including users and resources and so on, was treated as an entity and was binded by a corresponding certificate, ensuring that each resource was valid and nonauthorized access of users was forbidden. The architecture and workflow of the model as well as the formats of userls attribute certificate and resource's policy certificate were presented. The security, efficiency and extensibility of the model were analyzed. The results showed the model with single-login could access to resources in PULL mode, protect the private privacy and the access control policy and could be implemented easily.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第5期30-32,39,共4页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国家自然科学基金重大资助项目(90412010)
关键词 信任协商 认证 授权 属性证书 trust negotiation authentication authorization attribute certificate
  • 相关文献

参考文献7

  • 1Li N,Mitchell J C.RT:a role-based trust-management framework[C]∥Seamonst K E,ed.Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03).Washington:IEEE Press,2003:214-226.
  • 2Li N,Mitchell J C,Winsborough W H.Design of a role-based trust-management framework[C]∥Cart I,ed.Proceedings of the 2002 IEEE Symposium on Security and Privacy.Now York:IEEE Computer Society Press,2002:114-130.
  • 3Seamons K E,Winslett M,Yu T,et al.Requirements for policy languages for trust negotiation[C]∥Li N,ed.Proceeding of 3rd IEEE Intel Workshop on Policies for Distributed Systems and Networks.New York:IEEE Computer Society Press,2002:68-79.
  • 4Winsborough W H,Li N.Towards practical automated trust negotiation[C]∥Cart I,ed.Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks.New York:IEEE Computer Society Press,2002:92-103.
  • 5Winsborough W H,Li N.Protecting sensitive attributes in automated trust negotiation[C]∥Seamons K E,ed.Proceeding of ACM Workshop on Privacy in the Electronic Society.Washington:ACM Press,2002:102-113.
  • 6Hull R,Kumar B,Lieuwen D.Towards federated policy management[C]∥Li N,ed.Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks.New York:IEEE Computer Society Press,2002:92-103.
  • 7Kapadia A,Sampemane G,Campbell R H.Know:why your access was denied:regulating feedback for usable security[C]∥Cart H,ed.Conference on Computer and Communications Security.Washington:ACM Press,2004:302-314.

同被引文献30

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部