期刊文献+

对等网信任管理模型及安全凭证回收方法的研究 被引量:8

The Study of P2P Trust Management Model and Certificate Revocation Approach
下载PDF
导出
摘要 从P2P网络开放性、分布性、动态性等特点出发,给出P2P环境下基于信任值的信任管理模型.针对安全凭证的回收问题结合P2P网络的特点,提出了安全凭证状态信息发布方法HYBIRD和基于BloomFilter的安全凭证有效性确认方法.实现了基于BloomFilter的CRL压缩向量的有效广播,从而减少了安全凭证回收中节点瓶颈现象的发生. Because of the open, distributed and dynamic character of Peer-to-Peer(P2P), the security problem has become more difficult. It is significant to accomplish reasonable access control to resource in network. This paper proposes a trust management mode based on subjective trust value among entities for establishing initial trust relationship among entities and supporting authorization considering entities trust value. To accomplish certificate revocation, the authors provide revocation information publishing algorithm HYBRID and a method based on Bloom Filter vector to judge certificate validity. Experiments show the good performance of the proposed approaches.
出处 《计算机学报》 EI CSCD 北大核心 2006年第8期1282-1289,共8页 Chinese Journal of Computers
基金 国家自然科学基金(60473069 60496320)资助
关键词 P2P 信任管理 信任值 安全凭证 回收 peer-to-peer trust management trust value certificate revocation
  • 相关文献

参考文献10

  • 1高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20
  • 2王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 3Li Ning-Hui, Mitchell J. C.. RT: A role-based trust-management rramework. In: Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX Ⅲ),Washington, D.C., 2003, 201-212
  • 4Li Ning-Hui, Mitchell J. C. , Winsborough W. H.. Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, California,2002, 114-130
  • 5Liau Chu Yee, Bressan S. , Tan Kian-Lee. Efficient certificate revocation: A P2P approach. In: Proceedings of the Workshop on Southeast Asian Computing Research (ASIAN), Hanoi,2002, 312-316
  • 6Balakrishnan H. , Daashoek M. et al. Looking up data in P2P systems. Communications of the ACM, 2003, 43-48
  • 7Ng W. S. , Ooi B. C. , Tan K.-L.. Bestpeer: A selfconfigurable peer-to-peer system. In: Proceedings of the 18th International Conference on Data Engineering, San Jose, 2002, 463-475
  • 8Stoica I. , Morris R. , Karger D. , Kaashoek M. F. , Balakrishnan H.. Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the ACM SIGCOMM'01,San Diego, 2001, 534-546
  • 9El-Ansary S. , Alima L. O. , Brand P. , Haridi S.. Efficient broadcast in structured P2P networks. In: Proceedings of the 2nd International Workshop on Peer-to-Peer Systems (IPTPS 2003), London, 2003, 304-314
  • 10Cooper D. A.. A model of certificate revocation. In: Proceedings of the 15th Annual Computer Security Applications Conference, Scottsdale, 1999, 256-264

二级参考文献28

  • 1Li NH,Winsborough WH,Mitchell JC.Distributed credential chain discovery in trust management.Journal of Computer Security,2003,11(1):35-86.
  • 2Li NH,Mitchell JC.RT:A role-based trust-management framework.In:Proc.of the 3rd DARPA Information Survivability Conf.and Exposition.Washington,IEEE Computer Society Press,2003.201-212.http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
  • 3Clarke D,Elien JE,Ellison C,Fredette M,Morcos A,Rivest R.Certificate chain discovery in SPKI/SDSI.Journal of Computer Security,2001,9(4):285-322.
  • 4Aura T.Fast access control decisions from delegation certificate databases.In:Proc.of the 3rd Australasian Conf.on Information Security and Privacy (ACISP '98).Brisbane:Springer-Verlag,1998.284-295.http://research.microsoft.com/users/tuomaura/Publications/aura-acisp98.pdf
  • 5Ellison C,Frantz B,Lampson B,Rivest R,Thomas B,Ylonen T.SPKI certificate theory.Internet RFC 2693,1999.
  • 6Jim T.SD3:A trust management system with certificate evaluation.In:Proc.of the 2001 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2001.106-115.
  • 7Li NH,Mitchell UC,Winsborough WH.Design of a role-based trust-management framework.In:Proc.of the 2002 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2002.114-130.http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
  • 8Ajmani S,Clarke DE,Moh CH,Richman S.ConChord:Cooperative SDSI certificate storage and name resolution.In:Proc.of the 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS 2002).Cambridge:Springer-Verlag,2002.141-154.http://pmg.csail.mit.edu/~ajmani/papers/lncs2429.pdf
  • 9Ellison C.SPKI Requirements.Internet RFC 2692,1999.
  • 10Hildrum K,Kubatowicz JD,Rao S,Zhao BY.Distributed object location in a dynamic network.In:Proc.of the 14th ACM Symp.on Parallel Algorithms and Architectures.Winnipeg:ACM Press,2002.41-52.http://oceanstore.cs.berkeley.edu/publications/papers/pdf/SPAA02.pdf

共引文献34

同被引文献85

引证文献8

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部