期刊文献+

P2P网络下基于联合投票的成员资格协议 被引量:1

A collaborative membership protocol based on joint votes for P2P network
下载PDF
导出
摘要 基于CA的信任管理不能适应动态、对等和分布的点到点网络,提出的基于联合投票的成员资格协议实现分布式环境和点到点模式下节点身份控制和关键属性的初始化.该协议通过点组成员共同投票,以权重联合投票门限主体决定是否允许申请者加入该点组;通过增加角色信任度描述节点的投票,能更好地表达投票者的意愿;通过增加角色代理能力作为授权转让的参考,从宽度和深度两个方面实现授权转让范围的控制.另外该协议中各个节点还可以独立地作为CA来签发各自的投票,这是纯粹的点到点模式下的点组允入协议,摆脱了客户/服务器结构所固有的缺陷.并用运行模式分析方法说明了该协议形式的安全性. Trust management based on CA can not suit the Peer-to-Peer network of dynamic, symmetry and decentralization. The CMPJV is proposed to determine whether or not to permit one applicant to join the peer group by joint votes of all the peers in the peer group, and to initialize the applicant's key attributes in the decentralized environment. The final result of joint votes is calculated by WCVTS, which introduces two factors; original role trust that permits peer to vote more precisely instead of yes or no, and role delegation ability that is used to limit the authorization scope horizontally and vertically. In addition, because any one peer is his own CA to issue his vote for the applicant, and CMPJV is one pure peer-to-peer group admission protocol , it can better overcome the inherent drawbacks of Client/Server. Finally, the running model's analysis is used to verify its formal security.
作者 田玉敏 马勇
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2007年第1期110-114,共5页 Journal of Xidian University
关键词 点到点网络 信任管理 成员资格 P2P network trust management membership
  • 相关文献

参考文献9

  • 1Marty H,Jackson K R.Security for Grids[J].Proceedings of the IEEE,2005,93(3):644-652.
  • 2Ellison C,Frantz B,Lampson B,et al.SPKI Certifiacate Theory[DB/OL].[2004-10-12].http://www.rfc-archive.org/getrfc.php?rfc=2693.
  • 3Sandhu R,Coyne E,Feinstein H,et al.Role-based Access Control Model[J].IEEE computer 1996,29(2):38-47.
  • 4Barka E,Sandhu R.A Role-based Delegation.Model and Some Extensions[DB/OL].[2005-01-08].http://ite.gmu.edu/list/confrnc/nissc/rbdmoo.pdf.
  • 5Ninghui L.,Grosof B N,Feigenbaum J.Delegation Logic:a Logic-based Approach to Distributed Authorization[J].ACM Trans on Information and System Security (TISSEC),2003,6(1):128-171.
  • 6Fan H,Zhu X,Shaobin W.Delegation Depth Control in Trust-management System[C]//Proceedings of the 19th International Conference on Advanced Information Network and Applications (AINA'05).Washington:IEEE Computer Society,2005:411-414.
  • 7Kim Y,Mazzocchi D,Tsudik G.Admission Control in Peer Groups[C]//Proceedings of IEEE International Symposium on Network Computing and Applications (NCA).Washington:IEEE Computer Society,2003:131-139.
  • 8Saxena N,Tsudik G.Admission Control in Peer-to-Peer:Design and Performance Evaluation[C]//Proceedings of ACM Workshop on Security of AD Hoc and Sensor Networks (SASN).Fairfax:ACM Press,2003:104-113.
  • 9Zhang Yu,Li Xianxian,Hai Jinpend,et al.Access Control in Peer-to-Peer Collaborative Systems[C]//Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'05).Washington:IEEE Computer Society,2005:835-840.

同被引文献11

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部