期刊文献+

一种基于信任度的自组安全互操作方法 被引量:10

A Trustworthiness Based Ad-Hoc Secure Interoperation Method
下载PDF
导出
摘要 提出了基于信任度的自组安全互操作方法,引入信任度描述自治域和用户正确参与协作的概率.自治域对用户的信任度由二者的直接交互经验以及其他域对用户的评价共同决定,满足信任策略要求的用户允许执行角色.用户的恶意历史行为将会降低其信任度,从而影响执行角色的范围.自治域对其他域的信任度由对用户的评价与直接经验的偏差根据加权主要算法反馈更新.自治域的恶意评价影响其推荐信息的可信程度.实验结果表明,该方法能够有效地抵御欺骗和恶意行为. A trustworthiness-based ad-hoc secure interoperation method is proposed, in which the concept of trustworthiness is introduced to describe the probability of proper collaboration. The trustworthiness of an autonomic domain on a user is decided jointly by direct experiences of interactions and other domains' assessments on the user. Only the users who satisfy the requirements of target domains' trust policies have the privileges to access entry roles. Records of a user's malicious actions will decrease his trustworthiness and then accordingly reduce his privileges. Target domain uses weighted majority algorithm to update recommender's trustworthiness, which is reduced by unfair ratings. Experimental results show that this method can effectively resist cheating and malicious actions.
出处 《软件学报》 EI CSCD 北大核心 2007年第8期1958-1967,共10页 Journal of Software
基金 the Science-Technology Project of the National "Tenth Five-Year-Plan" of China under Grant No.2005BA113A02 (国家"十五"攻关计划) the Graduate Innovation Grant of the Chinese Academy of Sciences (中国科学院研究生创新资金)
关键词 授权 自组协同 安全互操作 信任度 加权主要算法 authorization ad-hoc collaboration secure interoperation trustworthiness weighted majority algorithm
  • 相关文献

参考文献1

二级参考文献14

  • 1Li Ninghui, W. H. Winsborough, J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35~86.
  • 2Li Ninghui, J. C. Mitchell, W. H. Winsborough. Design of a role-based trust management framework. In: Proc. IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 2002.
  • 3C.Wong, M. Gouda, S. Lam. Secure group communications using key graphs. IEEE/ACM Trans. Networking, 2000, 8(1):16~30.
  • 4P. Judge, M. Ammar. Gothic: A group access control architecture for secure multicast and anycast. The 21st Annual Joint Conf. IEEE Computer and Communications Societies, New York, 2002.
  • 5P. McDaniel. Policy management in secure group communication:[Ph. D. dissertation ]. Ann Arbor, MI: Unive rsity of Michigan,2001.
  • 6D. Shands, R. Yee, J. Jacobs, et al. Secure virtual enclaves:Supporting coalition use of distributed application technologies. In:Proc. DARPA Information Survivability Conf. & Exposition.New York: ACM Press, 2000.
  • 7O. Rodeh, K. P. Birman. The architecture and performance of security protocols in the ensemble group communication system:Using diamonds to guard the castle. ACM Trans. Information and System Security, 2001, 4(3): 289~31.
  • 8D. A. Agarwal, O. Chevassut, M. R. Thompson, et al. An integrated solution for secure group communication in wide-area networks. The 6th IEEE Symposium on Computers and Communications, Hammamet, Tunisia, 2001.
  • 9M. Thompson. Certificate-based access control for widely distributed resources. In: Proc. the 8th Usenix Security Symposium. Los Alamitos, CA: IEEE Computer Society Press,1999.
  • 10L. Pearlman, V. Welch, I. Foster, et al. A community authorization service for group collaboration. In: Proc. IEEE 3rd Int'l Worksbop on Policies for Distributed Systems and Networks.Los Alamitos, CA: IEEE Computer Society Press, 2001.

共引文献3

同被引文献166

引证文献10

二级引证文献49

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部