期刊文献+

信任在访问控制中的应用及研究 被引量:3

Using trust in access control mechanism
下载PDF
导出
摘要 根据大规模、开放式的分布式网络环境的特点,分析了传统安全机制的不足,把信任机制引入到访问控制中,并给出了信任的定义和分类,重点讨论了行为信任的性质和计算方法,给出相应的访问控制模型。通过同时对身份信任和行为信任的验证,增强了资源访问的安全性。 According to the characteristics of the large-scale distributed network environment, the flaws of trade security mechanism is analyzed and trust is introduced in access control mechanism. The definition and classification of trust are given, the properties and calculation method of behavior trust is discussed, and the corresponding access control model is given. Identity trust and behavior trust are both verified to enhance the resources of the security.
作者 宋俊昌 苏成
出处 《计算机工程与设计》 CSCD 北大核心 2007年第19期4609-4611,共3页 Computer Engineering and Design
关键词 信任 信任模型 访问控制 分布式环境 网络安全 trust trust mode access control distributed network environment network security
  • 相关文献

参考文献8

  • 1Dellarocas C.Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior[C].Minneapolis,USA:Proceedings of the 2nd ACM Conference on Electronic Commerce,2000:150-157.
  • 2Resnick P,Zeckhauser R.Trust among strangers in internet transactions:Empirical analysis of ebay's reputation system[C].Proceedings of NBER Workshop on Empirical Studies of Electronic Commerce,2000:1-26.
  • 3Dellarocas C.Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms[C].Tampa,Florida:Proc of the 3rd ACM Conf on Electronic Commerce,2001:171-179.
  • 4Aberer K,Despotovic Z.Managing trust in a Peer-to-Peer information system[C].New York,USA:Proceedings of the 10th International Conference on Information and Knowledge Management,2001:310-317.
  • 5Cornelli F.Choosing reputable servents in a P2P network[C].Proc of the 11th Int'l World Wide Web Conf.Hawaii:ACM Press,2002:441-449.
  • 6Kamvar S D,Schlosser M T.EigenRep:Reputation management in P2P networks[C].Proc of the 12th Int'l World Wide Web Conf.Budapest:ACM Press,2003:123-134.
  • 7Theodorakopoulos G,Baras J S.Trust evaluation in ad-hoc networks[C].Proc of ACM Workshop on Wireless Security,2004:1-10.
  • 8Azzedin F,Maheswaran M.Evolving and managing trust in grid computing systems[C].IEEE Canadian Conference on Electrical and Computer Engineering,2002:1424-1429.

同被引文献40

  • 1向海华.电子商务环境中虚拟社区的知识共享活动[J].情报杂志,2004,23(7):75-76. 被引量:14
  • 2龙勤,刘鹏,潘爱民.基于角色的扩展可管理访问控制模型研究与实现[J].计算机研究与发展,2005,42(5):868-876. 被引量:26
  • 3王远,徐锋,曹春,吕建.一个基于信任管理的分布式访问控制系统的设计与实现[J].计算机科学,2005,32(8):226-229. 被引量:3
  • 4刘佳,樊治平,杨国梁.一种面向知识共享的虚拟社区模型框架[J].管理学报,2006,3(2):190-194. 被引量:23
  • 5Wasko M M,Faraj S.Why should I share? Examining social capital and knowledge contribution in electronic networks of practice[J].MIS Quarterly,2005,29(1):35-57.
  • 6Alavi M,Tiwana A.Knowledge integration in virtual teams:The potential role of KMS [J].Journal of the American Society for Information Science and Technology,2002,53(12):1029-1037.
  • 7Alexander Ardichvili, Vaughnn Page, Tim Wentling. Motivation and barriers to participation in virtual knowledge-sharing communities of practice [J].Knowledge Management,2003,7( 1 ):64-77.
  • 8Teo H H,Chan H C,Wei K K, et al.Evaluating information accessibility and community adaptivity features for sustaining virtual learning communities [J]. International Journal of HumanComputer Studies,2003,59(5):671-697.
  • 9Dube L,Bourhis A,Jacob R.Towards a typology of virtual communities of practice[EB/OL].http://gresi.hec.ca/cahier.asp,2003.
  • 10Koh J,Kim Y G.Knowledge sharing in virtual communities:An E-business perspective [J]. Expert Systems with Applications, 2004,26:156-166.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部