期刊文献+

网格安全中的信任度评估模型研究 被引量:4

The Study on the Trust Values Assess Model in Grid Computing Security
下载PDF
导出
摘要 信任管理是当前网格计算安全研究的热点。在介绍网格基本概念、信任管理概念和概述信任度评估模型的基础上,根据信任评价的特点,提出了一个基于模糊理论信任度评估模型,描述了计算用户信任度的方法和步骤,使得信任度的计算更加灵活、评价更为合理科学。 Trust management is now one of the interesting research topics in the field of grid computing security. The paper introduces the basic concepts of grid computing, the basic theory of trust management and summaries the trust values assess system presented by others. And then, the model of trust values assess system based on fuzzy theory is presented, the method and computing steps of user' s trust values if described, which makes the computation of trust values more flexible and the access of trust values more scientific.
作者 李绍华
出处 《微计算机信息》 北大核心 2007年第04X期119-120,105,共3页 Control & Automation
基金 广东省自然科学基金资助项目(04009947)
关键词 信任管理 模糊理论 信任度评估 Trust Management, Fuzzy Theory, Trust Values Asses
  • 相关文献

参考文献5

  • 1徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 2施运梅,刘梅彦,杨根兴.网格资源管理模型研究[J].微计算机信息,2006(01X):109-111. 被引量:16
  • 3Rohit Khare,Adam Rifkin,Trust management on the World Wide Web,Computer Networks and ISDN Sysums,30(1998)651-653
  • 4Sihem Guemara-ElFatmi,Noureddine Boudriga,M.S.Obaidat,Relational-based calculus for trust management in networked services,Computer Communications 27(2004) 1206-1219
  • 5Denis Trcek,Towards trust management standardization,Computer Standards & Interfaces 26(2004)543-548

二级参考文献22

  • 1贾月琴,张宁,宋晓虹.对网格安全技术的讨论[J].微计算机信息,2005,21(3):199-200. 被引量:53
  • 2Junwei Cao, Daniel P Spooner, et al Agent-based Grid Load Balancing Using Perfromance-driven Task Sechduling[C]. International Parallel and Distributed Processing Symposium, 2003.49-58
  • 3Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 4Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 5Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 6Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 7Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 8Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 9Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 10Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.

共引文献127

同被引文献17

  • 1李浩君,邱飞岳,王丽萍.移动Agent安全检测协议研究[J].计算机工程与应用,2005,41(8):140-142. 被引量:1
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3张艳群,张辰.基于模糊理论的信任度评估模型[J].计算机工程与设计,2007,28(3):532-533. 被引量:26
  • 4石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展,2007,44(1):1-10. 被引量:21
  • 5M. Blaze, J. Feigenbaum, J. Lacy, Decentralized Trust Management, Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA ,1996, pp. 164-173.
  • 6CHU Yang-hua, Feigenbaum J., Lamacchia B. et al. REFEREE: trust management for Web applications. Computer Networks and ISDN Systems.1997, 29(8):953-964.
  • 7Xiaoqi LI, Michael R and Jiangchuan Liu;'A Trust Model Based Routing Protocol for Secure Ad Hoc Network ".,in Proceedings of the 2004 IEEE Aerospace Conferece,2004.
  • 8Farag Azzendin and Muthucumaru Maheswaran, "Evolving and Managing Trust in GridComputing Systems", in Proceedings of the 2002 IEEE Canadian Conference on Electrical&Computer Engineering, 2002.
  • 9XU Li,LIN Zhi-wei,YE A-yong.Analysis and counter measure of selfish node problem in mobile Ad hoc network[C].Proc of the 10th Computer Supported Cooperative Work in Design International Conference,2006:1-4.
  • 10Josang A. A logic for uncertain probabilities [J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,2001,9(3):279-211.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部