期刊文献+

一种基于属性的自动信任协商方法

An Approach to Attribute-based Automated Trust Negotiation
下载PDF
导出
摘要 提出一种基于属性的信任协商方法。协商的双方首先交换包含多个加密属性的信任证书,然后双方根据自己的访问控制策略多次交换密钥逐步向对方显示出自己的属性。在这种协商方法中,双方可以控制自己的信任书中属性值的出示,且该协商方法使用椭圆曲线密钥交换算法产生会话密钥,计算量比较小。 In this paper,an approach to attribute- based automated trust negotiation is proposed that can build up the trust between the entities. Both the client and the system exchange the credential which includes some encrypted attributes as requested by the access control strategy, which is guided by the trust negotiation strategy and disclose their own sensitive attributes gradually. Both the client and the system can control the disclosure of attribute values in the credential, and the approach to automated trust negotiation generate the session key by the elliptic curve key - Exchange algorithm, so the task of calculation is small.
出处 《计算技术与自动化》 2008年第4期118-121,共4页 Computing Technology and Automation
基金 福建省科技发展计划基金资助项目(2007F5071)
关键词 信任协商 属性证书 密钥协商 trust negotiation attribute certificate key agreement
  • 相关文献

参考文献12

二级参考文献62

  • 1LIXiang-xue CHENKe-fei LIShi-qun.Cryptanalysis and Improvement of Signcryption Schemes on Elliptic Curves[J].Wuhan University Journal of Natural Sciences,2005,10(1):231-234. 被引量:2
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 4Li N,Mitchell J C.RT:a role-based trust-management framework[C]∥Seamonst K E,ed.Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX'03).Washington:IEEE Press,2003:214-226.
  • 5Li N,Mitchell J C,Winsborough W H.Design of a role-based trust-management framework[C]∥Cart I,ed.Proceedings of the 2002 IEEE Symposium on Security and Privacy.Now York:IEEE Computer Society Press,2002:114-130.
  • 6Seamons K E,Winslett M,Yu T,et al.Requirements for policy languages for trust negotiation[C]∥Li N,ed.Proceeding of 3rd IEEE Intel Workshop on Policies for Distributed Systems and Networks.New York:IEEE Computer Society Press,2002:68-79.
  • 7Winsborough W H,Li N.Towards practical automated trust negotiation[C]∥Cart I,ed.Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks.New York:IEEE Computer Society Press,2002:92-103.
  • 8Winsborough W H,Li N.Protecting sensitive attributes in automated trust negotiation[C]∥Seamons K E,ed.Proceeding of ACM Workshop on Privacy in the Electronic Society.Washington:ACM Press,2002:102-113.
  • 9Hull R,Kumar B,Lieuwen D.Towards federated policy management[C]∥Li N,ed.Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks.New York:IEEE Computer Society Press,2002:92-103.
  • 10Kapadia A,Sampemane G,Campbell R H.Know:why your access was denied:regulating feedback for usable security[C]∥Cart H,ed.Conference on Computer and Communications Security.Washington:ACM Press,2004:302-314.

共引文献100

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部