期刊文献+

基于可信计算的网格行为信任模型研究 被引量:4

A Grid Behavior Trust Model Based on Trusted Computing
下载PDF
导出
摘要 网格环境中的信任问题是网格计算发展过程中必须解决的一个重要问题。网格实体间的信任可以分为身份信任和行为信任两种,其中行为信任关注的是更广泛意义上的可信性问题,具有动态性和不确定性等特点,实体可以根据彼此之间的交互经验动态更新实体间的信任关系。而可信计算技术是为应对计算机安全问题而提出的一种底层的、整体的解决方案。该文以可信计算平台为基础,提出了一种网格环境中的行为信任模型,并对行为信任进行量化评估,最后对该模型中的几个关键问题进行了分析。 The "Trust" in a grid environment is an important problem in the development of grid computing.The trust notion in grid include identity trust and behavior trust,and behavior trust which is dynamic and uncertain concerns a wider notion of trustworthiness, and entities can update their mutual trust relationship among entities dynamically based on their past transaction experiences.Trusted computing technology is is an basic,entirely solution for security problems of computer.In this paper,a behavior trust model which is based on trused computin technology in grid and a method for measuring and evaluating the behavior trust are provided.At the end, we analyse some important problems in this model.
出处 《微计算机信息》 北大核心 2007年第24期61-62,6,共3页 Control & Automation
基金 "十一五"国防预研基金资助项目(编号不公开)
关键词 网格 行为信任 声誉 可信计算 grid, behavior trust, reputation, trusted computing
  • 相关文献

参考文献5

  • 1I Foster, C Kesselman eds. The Grid: Blueprint for a New Computing Infrastructure. San Fransisco, CA: Morgan Kaufmann, 1999
  • 2F Azzedin, M Maheswaran. Evolving and managing trust ih grid computing systems. In: Proceedings of the IEEE Canadian Conference on Electrical Computer Engineering, 2002.
  • 3A Abdul-Rahman, S Hailes. Supporting Trust in Virtual Communities. In: Proceedings of the Hawaii International Conference on System Sciences, Maul Hawaii,Jan 4-7,2000.
  • 4TCG.TCG Main Specification Version 1. 1b[EB/OL]. wwww.trustedcomputinggroup.org/home, 2004-06-30.
  • 5史创明,王立新.数字签名及PKI技术原理与应用[J].微计算机信息,2005,21(06X):122-124. 被引量:32

二级参考文献3

  • 1李明柱.PKI技术及应用开发指南[EB/OL].http://www-900.ibm.com/developerWorks/cn/security/se—pkiusing/index.shtml,(Accesse0Aug.22,2004).
  • 2MattBishop.ComputerSecurity,Art and Science[M].清华大学出版社,..
  • 3Bruce Schneier ,Applied Cryptography:Protocols,Algorithms,and Source Code in C ,John Wiley & Sons.

共引文献31

同被引文献21

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部