期刊文献+

分布式的SPKI/SDSI2.0证书链搜索算法 被引量:1

Distributed Credential Chain Discovery in SPKI SDSI2.0
下载PDF
导出
摘要 信任管理是一种适用于大规模分布式网络的访问控制机制,SPKI/SDSI2.0是目前信任管理体系中最成熟、最普及的一个.可目前已有的SPKI/SDSI2.0证书链搜索算法都是集中式的,而SPKI/SDSI2.0系统是一种分布式系统,证书是以分布式方式分发和存储的.针对此问题,首先给出一种合理的SPKI/SDSI2.0分布式证书存储策略,其中的证书是对象方完全可追溯的(subject-traces-all).在此基础上,提出了一种分布式的SPKI/SDSI2.0证书链搜索算法DCCDS,它是面向目标的(goal-directed).理论分析表明,算法具有较高的执行效率,而且可以实现对委托深度(delegation depth)的细粒度控制. Trust management is an approach to access control in a distributed environment.SPKI SDSI2.0 is the most popular trust management system at present.But the existing credential chain discovery algorithms in SPKI SDSI2.0 are all centralized.The needed credentials are either provided by users or it is assumed that they have been distributed to local machines before search,but SPKI SDSI2.0 is a distributed system,in which the credentials are often issued and stored in a distributed manner.To address this problem,a reasonable distributed credentials storage scheme is proposed in this paper.Each credential is stored in one place and all the credentials are subject-traces-all.Based on this scheme,DCCDS(distributed credential chain discovery in SPKI SDSI2.0) is put forward.Unlike other algorithms,DCCDS needn't reduce credentials and compute the name-reduction closure of a set of credentials.DCCDS searches all the name credentials for one princpal,at the same time,looks for the authorization credentials to all those name credentials.Finally,depth-first search is used to determine whether there exists a chain from self to the requestor.DCCDS is goal-directed,and it could gather automatically relevant name and authorization credentials which are needed.It is shown by theoretical analysis that DCCDS has a higher efficiency;moreover,it could solve the problem of delegation depth elegantly.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第7期1133-1141,共9页 Journal of Computer Research and Development
基金 国家“八六三”高技术研究发展计划基金项目(2007AA01Z410) 国家“九七三”重点基础研究发展规划基金项目(2007CB307101)
关键词 信任管理 SPKI/SDSI2.0 分布式 证书 证书链搜索 trust management SPKI SDSI2.0 distributed credential credential chain discovery
  • 相关文献

参考文献12

  • 1Blaze M, Feigenbaum J, Lacy J L. Decentralized trust management [C]//Proc of the 17th Symp on Security and Privacy. Los Alamitos: IEEE Computer Society, 1996: 164- 173
  • 2Blaze M, Feigenbaum J, Strauss M. Compliance-checking in the PolicyMaker trust management system [C]//Proc of the 2nd Int'l Conf on Financial Cryptography. Berlin: Springer, 1998:254-274
  • 3Clarke D, Elien J, Ellison C. Certificate chain discovery in SPKI/SDSI [J]. Journal of Computer Security, 2002, 9(4): 285-322
  • 4Elien J. Certificate discovery using SPKI/SDSI2. 0 Certificates[D]. Cambridge, Massachusetts: Massachusetts Institute of Technology, 1998
  • 5Jha S, Reps T. Analysis of SPKI/SDSI certificates using model checking [J]. Journal of Computer Security, 2004, 12 (3) : 317-353
  • 6Hristova K, Tekle K T, Liu Y A. Efficient trust management policy analysis from rules [C] //Proc of the 9th ACM SIGPLAN Int'l Symp on Principles and Practice of Declarative Programming. New York: ACM, 2007:211-220
  • 7Li N, Mitchell J. DATALOG with constraints: A foundation for trust management languages [C] //Proc of the 5th Int'l Syrup on Practical Aspects of Declarative Languages. Berlin: Springer, 2003:58-73
  • 8Li N, William W, John M. Distributed credential chain discovery in trust management [J]. Journal of Computer Security, 2001, 11(1): 35-86
  • 9Li N, Mitchell J, Winsborough W. Design of a role-based trust management framework [C]//Proc of the IEEE Syrup on Security and Privacy. Washington, IEEE Computer Society, 2002: 114-130
  • 10Li N. Local names in SPKI/SDSI [C] //Proc of the 13th IEEE Computer Security Foundation Workshop. Washington: IEEE Computer Society, 2000:2-15

二级参考文献16

  • 1Clarke D. , Elien J. E. , Ellison C. et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 2Li N. , Winsborough W. H. , Mitchell J. C.. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35-86
  • 3Zhu Xian, Wang Shao-Bin, Hong Fan et al. Distributed credential chain discovery in trust-management with parameterized roles. In:Proceedings of the 4th International Conference on Cryptology and Network Security (CANS05). Xiamen, China,2005, 334-348
  • 4Beth T. , Boreherding M. , Klein B.. Valuation of trust in open networks. In: Gollmann D. ed. Proceedings of the 3rd European Symposium on Research in Computer Security (ESORICS 94), Brighton, UK: Springer-Verlag, 1994, 3-18
  • 5Wang Lun-Wei, Liao Xiang-Ke, Wang Huai-Min. AT-PAM:Authentication Trustworthiness-based PAM. In: Proceedings of the 3rd International Conference on Information Security,Shanghai, China, 2004, 204-209
  • 6Jφsang A. , Pope S.. Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling(APCCM2005), Newcastle, NSW, Australia, Australian Computer Society, 2005, 59-68
  • 7Kapadia A. , Al-Muhtadi J. , Campbell R. H. , Mickunas D..IRBAC 2000: Secure interoperability using dynamic role translation. University of Illinois, DeKalb, Ill. , USA: Technical Report UIUCDCS-R-2000-2162, 2000
  • 8Shehab M. , Bertino E. , Ghafoor A.. SERAT: SEcure Rolem Appling Technique for decentralized secure interoperability.In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, 159-167.
  • 9Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1996, 164-173
  • 10Blaze M. , Feigenbaum J. , Ioannidis J. , Keromytis A. D..The KeyNote Trust-Management Version 2. RFC 2704, 1999.http://www.faqs.org/rfcs/rfc2704.html

共引文献29

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部