期刊文献+

自动信任协商在P2P系统中的应用 被引量:1

Application of Automated Trust Negotiation in P2P System
下载PDF
导出
摘要 由于P2P系统具有分布性、开放性等特点,传统的访问控制和认证的方法不能很好地在P2P系统中适用。一些专门解决P2P系统中的信任问题的声誉系统也存在着容易被虚伪的节点所攻击的缺陷。文章研究了自动信任协商机制如何通过互相出示证书的方法合理地解决了P2P系统中的访问控制和认证问题,针对自动信任协商中存在策略循环依赖的问题使用建立LTTP的方法加以解决,并通过模拟实验证明LTTP的确能够提高信任协商的成功率。 As P2P system is inherently decentralized and open, some traditional access control and authentication approaches cannot be adapted in P2P system. Some reputation systems which aim to solve the trust problem in P2P system may be easily attacked by some hypocritical peers. This paper researches on automated trust negotiation mechanisms which use exchanging credentials to completely solve the access control and authentication problems in P2P systems, builds LTTP to solve the cyclic interdependent policies problem in ATN, experiments prove that LTTP can improve the success rate of ATN.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第6期132-133,160,共3页 Computer Engineering
关键词 信任 声誉系统 自动信任协商 策略循环依赖 局部可信第三方 Trust Reputation system Automated trust negotiation Cyclic interdependent policies Local trusted third party
  • 相关文献

参考文献6

  • 1Aberer K,Despotovic Z.Managing Trust in a Peer-to-peer Information System[C]//Proc.of 2001 ACM CIKM International Conference on Information and Knowledge Management.2001.
  • 2Ye S,Makedon F,Ford J.Collaborative Automated Trust Negotiation in Peer-to-peer System[C]//Proc.of the 4^th International Conference on Peer-to-peer Computing.2004.
  • 3William H,Winsborough,Li Ninghui.Towards Practical Automated Trust Negotiation[C]//Proceedings of the 3^rd International Workshop on Policies for Distributed Systems and Networks.2002.
  • 4Yu Ting,Ma Xiaosong,Winslett M.PRUNES:An Efficient and Complete Strategy for Automated Trust Negotiation over the Internet[C]//Proceedings of the 7^th ACM Conference on Computer and Communications Security.2000.
  • 5Li Ninghui,Du Weliang,Boneh D.Oblivious Signature-based Envelope[C]//Proceedings of the 22^th Annual Symposium on Principles of Distributed Computing.2003.
  • 6Blaze M,Feigenbaum J,Keromytis A D.The Key Note Trust Management System[Z].Internet Draft,1998.

同被引文献6

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 3EBay[EB/OL].[2010-04-13].http://www.ebay.com.
  • 4HOLT J E, BRANDSHAW R W, SEAMONS K E, et al. Hidden credentials[C/OL]// WPES'03. New York: ACM, 2003 [2010 -03 - 22]. http://citeseerx. ist. psu. edu/viewdoc/download? doi = 10.1.1.2. 5797&rep = repl &type = pdf.
  • 5LI JIANGTAO, LI NINGHUI. OACerts: Oblivious attribute certificates[ J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4): 340-352.
  • 6LI JIANGTAO, LI NINGHUI, WINSBOROUGH W H. Automated trust negotiation using cryptographic credentials[ C]//ACM Conference on Computer and Communications Security. New York: ACM, 2005:100 - 108.

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部