期刊文献+

Agent based automated trust negotiation model 被引量:1

一种基于代理的自动信任协商模型(英文)
下载PDF
导出
摘要 To enhance the practicability of the trust negotiation system, an agent based automated trust negotiation model (ABAM) is proposed. The ABAM introduces an agent to keep the negotiation process with no human intervention. Meanwhile, the ABAM specifies the format of a meta access control policy, and adopts credentials with flexible format to meet the requirements of access control policies instead of disclosing the whole contents of a certificate. Furthermore, the ABAM uses asymmetric functions with a high security intensity to encrypt the transmitting message, which can prevent information from being attacked. Finally, the ABAM presents a new negotiation protocol to guide the negotiation process. A use case is studied to illuminate that the ABAM is sound and reasonable. Compared with the existing work, the intelligence, privacy and negotiation efficiency are improved in the ABAM. 为增强信任协商系统的实用性,提出一种基于代理的自动信任协商模型(ABAM).ABAM引进代理使协商过程免于人工干涉.同时,ABAM指定了元策略格式,使用这种格式灵活的信任凭证来满足访问控制策略要求,而不需披露数字证书的全部内容.此外,ABAM使用高强度的非对称函数加密传输消息,能防止消息遭受攻击.最后,模型中提出一种新的协商协议来指导协商进行.事例分析表明,ABAM是健全和合理的.与现有工作相比,ABAM在智能性、保密性和协商效率方面得到了改进.
出处 《Journal of Southeast University(English Edition)》 EI CAS 2007年第3期469-473,共5页 东南大学学报(英文版)
基金 The National Natural Science Foundation of China(No60403027)
关键词 automated trust negotiation AGENT CREDENTIAL access control policy negotiation protocol 自动信任协商 代理 信任凭证 访问控制策略 协商协议
  • 相关文献

参考文献1

二级参考文献2

共引文献51

同被引文献7

  • 1Lampson B W.Protection[C].In:Proc of 5th Princeton Symposium on Information Science and Systems,437-443(1971).Reprinted in ACM operating Systems Review,1974,08(01) 18-24.
  • 2Harrison M H,Ruzzo W L,Ullman J D.Protection in Operating Systems[J].Communications of ACM,1976,19(08) 461-471.
  • 3Lipton R J,Snyder L.A linear time algorithm for deciding subject security[J].Journal of ACM,1977,24(03) 455-464.
  • 4Sandhu R S.The typed access matrix model[C].In Proc of the IEEE Symposium on Security and Privacy,1992:122-136.
  • 5Soshi M.Safety analysis of the dynamic-typed access matrix model[C].In Proc of 6th European Symposium on Research in Computer Security,2000,106-121.
  • 6Ferraiolo D F,Sandhu R S,Gavrila S.Proposed NIST standard for role-based access control[C].ACM transactions on Information and System Security,2001,04(03) 224-274.
  • 7Aisuwaiyel M H.Algorithms design techniques and analysis[M].World Scientific Publishing Co.Pte.Ltd.2005.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部