期刊文献+

自动信任协商中的推理攻击分析 被引量:1

The Analysis of Inference Attack in Automated Trust Negotiation
下载PDF
导出
摘要 自动信任协商是陌生实体通过交替地披露属性证书建立信任关系的一种方法。主体拥有的不同属性之间可能存在着某种联系,某些属性的披露会导致其它敏感信息的泄露,即推理攻击。本文分析了属性间的线性关系,提出了属性敏感强度的概念,定义了属性敏感强度的偏序关系,在此基础上定义了自动信任协商系统抽象模型。针对几类推理攻击给出了相应的防御方案及其安全性分析。 Automated trust negotiation is an approach to build trust relationship between strangers by disclosing attribute credentials alternately. The attributes owned by principles are always relevant each other, so disclosing some attributes maybe induce leakage of sensitive information, namely inference attack. We give the definition and partial order of sensitivity intensity of private attribute, then an abstract automated trust negotiation model is proposed, which depicts relevancy not only between principles and attributes, but also between policies and attributes. As a result, several inference attacks in automated trust negotiation are discussed, then defense scheme and security analysis are presented.
出处 《计算机科学》 CSCD 北大核心 2007年第7期76-79,共4页 Computer Science
基金 国家自然科学基金(No60403027) 湖北省教育厅科学基金(NoQ200629001)资助
关键词 信任证 自动信任协商 推理攻击 授权管理 Credential, Automated trust negotiation, Inference attack, Authorization management
  • 相关文献

参考文献12

  • 1Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale J, Dinolt G,eds. Proceedings of the 17th Symposium on Security and Privacy. Okaland: IEEE Computer Society Press, 1996. 164-173
  • 2Blaze M, Feigenbaum J, Keromytis A D. Keynote: trust management for public-key infrastructures. In: Christianson B, Crispo B, William S. et al. eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59-63
  • 3Winsborough WH, Seamons KE, Jones VE. Automate trust negotiation. In: DARPA Information Survivability Conf and Exposition, 2000. 88-102
  • 4Li Ninghui, Mitchell JC, Winsborough WH. Design of a rolebased trust management framework. In: Proceedings of IEEE Symposium on Security and Privacy, 2002. 114-130
  • 5Li Ninghui, Winsborough WH, Mitchell JC. Distributed credential chain discovery in trust management. In:Proceedings of the 8th ACM Conference on Computer and Communications Security, 2001. 156-165
  • 6李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 7Winsborough WH, Li Ninghui. Protecting sensitive attributes in automated trust negotiation. In: Proceeding of ACM Workshop on Privacy in the Electronic Society, 2002. 102-113
  • 8Yu T, Winslett M. A Unified Scheme for Resource Protection in Automated Trust Negotiation. In: IEEE Symposium on Security and Privacy, 2003. 245-257
  • 9Bradshaw R W, Holt J E, Seamons K E. Concealing Complex Policies with Hidden Credentials. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004. 245-253
  • 10Irwin K, Yu T. Preventing Attribute Information Leakage in Automated Trust Negotiation. In.. Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005. 36-45

二级参考文献1

共引文献51

同被引文献29

  • 1廖振松,金海,邹德清,李赤松.自动信任协商抗攻击能力分析[J].计算机研究与发展,2006,43(z2):13-17. 被引量:1
  • 2Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation[C] ∥Proc.of DARPA Information Survivability Conference and Exposition.Piscataway,New Jersey:IEEE Press,2000:88-102.
  • 3Lee A J,Winslett M,Basney J,et al.The Traust Authorization Service[J].ACM Transactions on Information and System Security,2008,11(2):1-33.
  • 4Skogsrud H,Motahari N H R,Benatallah B,et al.Modeling trust negotiation for web services[J].IEEE Computer,2009,42(2):54-61.
  • 5Ryutov T,Zhou L,Neuman C,et al.Adaptive Trust Negotiation and Access Control[C] ∥Proc.of the Tenth ACM Symposium on Access Control Models and Technologies.Stockholm,Sweden,2005.
  • 6Squicciarini A,BertinolE,Ferrari E,et al.PP-Trust-X:A System for Privacy Preserving Trust Negotiations[J].ACM Transactions on Information and System Security (TISSEC).New York:ACM press,2007,10:1-48.
  • 7Lee A J,Winslett M.Enforcing Safety and Consistency Constraints in Policy-bBased Authorization Systems[J].ACM Transactions on Information and System Security,New York:ACM press,2007,9:1-30.
  • 8Dean D,Stubblefield A.Using Client Puzzles to Protect Tls[C] ∥Annual USENIX Security Symposium.Washington,DC,2001.
  • 9Wang X,Reiter M.Defending Against Denial-of-Service Attacks with Puzzle Auctions[C] ∥IEEE Symposium on Security and Privacy.Berkeley,CA,2003.
  • 10Li J,Li N,Wang X,et al.Denial of Service Attacks and Decentralized Trust Management[C] ∥Securecomm and Workshops.2006:1-12.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部