期刊文献+

信任机制及其在网格安全中的应用 被引量:2

An Application of Trust Mechanism in Grid Security
下载PDF
导出
摘要 分析了网格计算环境对信任机制的需求,将信任机制分为理性信任和感性信任,并给出了相应的两种信任机制模型,结合网格计算的安全功能,给出了有感性信任参与下的网格安全服务,最后结合基于角色的访问控制(RBAC)机制给出了该模型的一个实例,即通过理性信任和感性信任的评判得到信任度等级,根据该信任度等级来决定用户所分配的角色和权限集。 According to the requestment of Grid Computing for trust mechanism, the trust mechanism is divided into object trust and subject trust and the two trust mechanism models are proposed respectively. The Grid security model joined with subject trust mechanism is provided and an instance of the model including the model of role based access eontrol(RBAC)is shown, in which, the trust level obtained by the evaluation of the object trust and subject trust decides the assignment of the subset of roles and permissions.
出处 《计算机科学》 CSCD 北大核心 2007年第7期80-83,共4页 Computer Science
基金 国家自然科学基金(60573141和70271050) 江苏省自然科学基金(BK2005146) 江苏省高技术研究计划(BG2004004 BG2005037 BG2005038 BG2006001) 国家高科技863项目(2005AA775050) 南京市高科技项目(2006软资105) 现代通信国家重点实验室基金(9140C1101010603) 江苏省计算机信息处理技术重点实验室基金(kjs050001 kjs06) 江苏省高校自然科学研究计划(05KJB520092)资助
关键词 网格计算 感性信任 理性信任 角色的访问控制 Grid computing, Subject trust, Object trust, RBAC
  • 相关文献

参考文献9

  • 1Josang A, Knapskog S J. A metric for trusted systems[A]. Proceedings of the 21^st National Security Conference [C], NSA, 1998. 16-29
  • 2Yu B, Singh M P. Distributed Reputation Management for Electronic Commerce [J].Computational Intelligence, 2002, 18 (4) : 535-549
  • 3Yu B, Singh M P. Detecting Deception in Reputation Management[A].In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multi-Agent Systems[C].Melbourne, Australia, 2003. 73-80
  • 4唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. 被引量:236
  • 5徐锋,吕建,郑玮,曹春.一个软件服务协同中信任评估模型的设计[J].软件学报,2003,14(6):1043-1051. 被引量:69
  • 6Lin C, Varadharajan V,Wang Y,Pruthi V. Enhancing grid security with trust management[A]. Services Computing Proceedings[C] IEEE,2004. 303-310
  • 7Song S, Hwang K. Fuzzy trust integration for security enforcement in grid eomputing[A].In:International Symposium on Network and Parallel Computing(NPC2004)[C],2004
  • 8Azzedin F,Maheswaran M. Evolving and managing trust in grid computing systems [A].Electrical and Computer Engineering. IEEE CCECE 2002[C].Canadian, 2002. 1424-1429
  • 9Azzedin F, Maheswaran M. A trust brokering system and its application to resource management in public-resource grids[A]. In:18th International Parallel and Distributed Processing Symposium (IPDPS'04)[C], 2004. 22-32

二级参考文献9

  • 1Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 2Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 3Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 4Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 5Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 6Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
  • 7Reiter MK, Stubblebine SG. Toward acceptable metrics of authentication. In: Proceedings of the 1997 IEEE SYmposium on Research in Security and Privacy. Oakland: ACM Press, 1998.
  • 8Levien LR. Attack resistant trust metric [Ph.D. Thesis]. Berkeley: University of California, 2002.
  • 9徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113

共引文献288

同被引文献20

  • 1王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 2彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 3肖尚勤,卢正鼎,凌贺飞,邹复好.基于P2P系统信任机制的DRM模型[J].计算机研究与发展,2007,44(4):567-573. 被引量:7
  • 4孟祥怡,张光卫,刘常昱,康建初,李鹤松.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317. 被引量:36
  • 5Azzedin F, Maheswaran M. Evolving and managingtrust in grid computing systems[C]//IEEE Canadian Conference on Electrical &Computer Engineering (CCECE 2002). Piscataway, NJ, USA: IEEE, 2002 : 1424-1429.
  • 6Azzedin F, Maheswaran M. Integrating trust into grid resource management systems[C]//ProceedingsInternational Conference on Parallel Processing (ICPP 2002). Los Alamitos, CA, USA: IEEE Computer Society, 2002 : 47-54.
  • 7Hwang K, Song S, Lv J. Grid security enforcement with trust integration over minimal VPN tunnels[R]. USC Technical Report 2004-10. Los Angeles, CA, USA: IEEE Computer Magazine, 2004.
  • 8Song S, Hwang K. Security binding for trusted re- source allocation in computational grids [R]. USCInternet and Grid Computing Lab, Report 2004-8. Los Angeles, CA, USA: IEEE Trans on Parallel and Distributed Systems. 2004.
  • 9Song S, Hwang K. Trusted grid computing with se- curity assurance and resource optimization[C]//Pro-ceedings of the International Conference on Parallel and Distributed Computing Systems (PDCS 2004). Cary, NC, USA: ISCA, 2004:110-117.
  • 10Alunkal B, Veljkovic I, Laszewski G. Reputation- based grid resource selection [EB/OL]//(2005-05- 06 ). http://www, mcs. anl. gov/uploads/cels/pa- pers/pl127, pdf.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部