期刊文献+

一种改进的公钥证书抗攻击信任度模型

Improved attack-resist trust metric model for public key certification
下载PDF
导出
摘要 由信任的相关概念及信任特性入手,阐述了信任度提出的原因,介绍了几种信任度模型,分析了各模型的特点和共性。重点对Levien信任度模型进行了研究,分析了其存在的缺陷,并从攻击者角度提出一种改进的节点信任度模型。新模型基于Levien信任度模型结构特点,根据计算攻击者的攻击能力参数,引入信任传递衰减因数,综合度量每一节点的信任度,分析得出提高信任度的途径。 From the concept of trust and confidence related characteristics, the reason of raising the trust metric was introduced. Several trust metric models were recommended, and their characteristics and commonness were analyzed. The study focused on the Levien trust metric model and its shortcomings, and a modified node trust metric model was proposed from the perspective of the attacker. The new model, based on the structure of Levln's model, is used for computing attackers' capacities for a successful attack. It imports a descending factor of trust transmission to measure the trust metric of each node synthetically, and gives a better way to improve trust metrics through analysis.
出处 《计算机应用》 CSCD 北大核心 2007年第8期1919-1921,1925,共4页 journal of Computer Applications
关键词 公钥基础设施 信任 信任度 信任度模型 Public Key Infrastructure (PKI) trust trust metrics, trust metric model
  • 相关文献

参考文献10

  • 1JΦSANG A,GRAY E,KINATEDER M.Analysing topologies of transitive trust[C/OL]// Proceedings of the Workshop of Formal Aspects of Security and Trust (FAST),2003[2007-01-01].http://citeseer.ist.psu.edu/cache/papers/cs/32947/http:zSzzSzwww.informatik.uni-stuttgart.dezSzipvrzSzvszSzdezSzpeoplezSzkinatemlzSzpaperszSzJosangGrayKinateder_FAST2003.pdf/jsang03analysing.pdf.
  • 2LEVIEN R,AIKEN A.Attack-resistant trust metrics for public key certification[C/OL]// 7th USENIX Security,Symposium,January 26-29,1998,San Antonio,Texas.(2002-04-12)[2007-01-05].http://www.usenix.org/publications/library/proceedings/sec98/full_papers/levien/levien_html/levien.html.
  • 3BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]// Proceedings of the European Symposium on Research in Security (ESORICS).Brighton:Springer-Verlag,1994:3-18.
  • 4MAURER U.Modeling a public-key infrastructure[C]// BERTINO E.Proceedings of 1996 European Symposium on Research in Computer Security (ESORICS' 96),LNCS 1146.Berlin:Springer-Verlag,1996:325-350.
  • 5REITER M K,STUBBLEBINE S G.Toward acceptable metrics of authentication[C]// Proceedings of 1997 IEEE Symposium Security and Privacy.Washington:IEEE Computer Society,1997:10-20.
  • 6ZIMMERMANN P.Pretty good privacy user's guide:volume Ⅰ and Ⅱ[Z].Distributed with PGP software,1993.
  • 7周建峰,马玉祥,欧阳雄.PKI信任模型研究[J].电子科技,2006,19(4):75-78. 被引量:7
  • 8白保存,李中学,陈旺.一种新的PKI信任度模型算法设计[J].计算机测量与控制,2005,13(8):843-845. 被引量:1
  • 9JΦSANG A.An algebra for assessing trust in certification chains[C/OL]// Proceedings of the Network and Distributed Systems Security Symposium (NDSS' 99),1999[2007-01-15].http://sky.fit.qut.edu.au/~josang/papers/Jos1999-NDSS.pdf.
  • 10PERLMAN R.An overview of PKI trust model[J].IEEE Network Novermber,1991,3(6):38-43.

二级参考文献12

  • 1Yahalom R, Klein B, Beth T. Trust relationships in secure systems - a distributed authentication perspective [A]. Prec. 1993 IEEE Syrup. Besearch in Security and Privacy [C]. 1993, 150-164.
  • 2Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks [A].Proc. Computer Security- ESORICS '94 [C]. 1994 , 3-18.
  • 3Maurer U. Modelling a public - key infrastructure[A]. Computer security-ESORICS '96[C]. 1996.
  • 4Kohlas R, Maurer U. Confidence valuation in public - key infrastructure based on uncertain evidence [A]. International Workshop on Practice and Theory in Public Key Cryptosystems 2000 [C]. 2000.
  • 5Josang A, Knapskog S J. A metric for trusted systems [J]. Global IT Security. Wien : Austrian Computer Society, 1998. 541 - 549.
  • 6Reiter M K, Stubblebine S G. Toward acceptable metrics of authentication[A]. Proc. 1997 IEEE Syrup. Security and Privacy [C]. 1997, 10-20.
  • 7Ellison C, Schneier B. Ten Risk of PKI : you're not being told about public key infrastructure [J]. Computer Security Journal, 2000, 16 (1) : 1-7.
  • 8Abdul - Rahman A, Hailes S . A distributed Trust model. In model. [A].Proceedings of the 1997 New Security Paradigms Workshop [C]. Cumbrla,UK: ACM Press, 1998, 48-60.
  • 9Dellarocas C. The design of reliable trust management systems for electronic trading communities [EB/OL]. http: //ces. mit. edu/dell/trustmgt.pdf.
  • 10Reiter M K, Stubblebine S G. Path independence for authenti-cation in large - scale systems [A]. ACM Conference on Computer and Communications Security[C]. 1997, 57- 66.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部