期刊文献+

信任委托证书图搜索研究

Delegation graph search algorithms based DAG in distributed trust management
下载PDF
导出
摘要 分析了分布式信任管理的证书结构及证书授权模型,包括线性链式授权、门限授权、条件授权和复合证书授权等,探讨了不同模型下的证书表达与证书链处理机制,提出了基于有向无环图DAG的证书图结构,并对利用DAG表达证书图作出证明。在证书链的搜索算法中,通过对多重边的有向无环图用深度优先和广度优先算法结合实现对证书链的搜索,避免证书图中产生的环形链而导致低搜索效率问题。 Certification structures and delegation models in distributed trust management,including chain delegation,threshold delegation,conditional delegation and composed delegation relation,are introduced in this paper.A proof of describing a directed graph of certificate chain as a DAG (Directed Acyclic Graph) is given,which can avoid the cyclic path.Furthermore,an algorithm of certificate chain processing is presented,which searches the DAGs,and a DAG by depth-first-algorithm,and inter-DAGs by breadth-first-algorithm.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第4期125-127,133,共4页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60372046 60573043) 现代通信国家重点实验室基金(9140c1108010606)。
关键词 授权 信任管理 有向无环图 证书链搜索 delegation trust management Directed Acyclic Graph (DAG) certificate chain search
  • 相关文献

参考文献8

  • 1Carbone M,Nielsen M,Sassone V.A formal model for trust in dynamic networks[C]//Proceedings from Software Engineering and Formal Methods(SEFM'03).IEEE Computer Society Press,2003.
  • 2Aura T.Distributed access-rights management with delegation certificates[C]//Vitek J,Jensen C.Secure Internet Programming:Security Issues for Distributed and Mobile Objects,Fourth International Workshop,MOS'98 Brussels.Belgium:Springer-Verlag,1999.
  • 3Nielsen M,Rukow K.On the formal modeling of trust in reputationbased systems[C]//Karhumaki J,Maurer H,Paun G.Theory Is Forever:Essays Dedicated to Arto Salomaa,LNCS 3113 in Computer Science.Springer Verlag,2004:192-204.
  • 4Krubow K,Twigg A.Distributed approximation of fixed-point in trust structures,ROC S technical report,RS-05-6[R].2005.
  • 5Clarke D,Elien J E,Ellison C M,et al.Certificate chain discovery in SPKI/SDSI[J].Journal of Computer Security,2001,9(1/2):285-322.
  • 6Aura T.On the structure of delegation networks[C]//Proc 11th IEEE Computer Security Foundations Workshop,Rockport,MA,1998:14-26.
  • 7Li Ninghui,Winsborouth H,Mitchell C.Distributed credential chain discovery in trust management[C]//Proc of ACM Conf on Computer and Communications Security,2003,11 (1):35-86.
  • 8Weeks S.Understanding trust management systems[C]//Proc IEEE Symposium on Security and Privacy,Oakland,2001.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部