期刊文献+

普适计算环境下信任管理模型的研究 被引量:3

Research on the Trust Management Model for Pervasive Computing
下载PDF
导出
摘要 普适计算环境下,各种资源、设备、应用以及环境均是高度动态变化的,因此如何衡量实体间的信任关系成为了一个十分重要的问题。传统的安全和认证方法基于可信第三方,而在动态的普适计算环境下,可信第三方的设置是不现实的,也是不可行的。基于以上问题,提出了一个新的普适计算信任管理模型,该模型集成了信誉和风险分析机制,考虑了多种相关因素,可以有效建立和度量各实体间的信任关系。相关仿真结果证明,该模型是行之有效的。 In pervasive computing environment, various resources, devices and applications are frequently changeable. Therefore, how to measure the trust relationship between entities has become an important problem. Those traditional authentication and security solutions are mostly based on the third trusted party, however, it is infeasible to set the third trusted entities in dynamic pervasive computing environment. Based on the status quo, a novel trust management model was presented , several essential factors were considered. A reputation module and a risk analysis module were integrated in the model, by which it can establish and measure the trust relationship between various entities effectively. The simulation results prove that the model is feasible and effective. It is applicable in dynamic pervaisve computing environments.
出处 《计算机科学》 CSCD 北大核心 2009年第2期103-106,113,共5页 Computer Science
基金 天津市应用基础研究计划(自然科学基金)项目(06YFJMJC00200) 天津市科技发展计划项目(06YFGZGX05900)资助
关键词 普适计算 信任 信誉 风险分析 信任管理 Pervasive computing, Trust, Reputation, Risk analysis, Trust management
  • 相关文献

参考文献16

  • 1Sharmin M , Ahmed S , Ahamed S I. An adaptive lightweight trust reliant secure resource discovery for pervasive computing environments//Proeeedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCA)MW'06 ). Pisa, Italy, March 2006.. 258-263
  • 2Sharmin M, Ahmed S, Ahamed S I. SAFERD ( Secure, Adap rive, Fault Tolerant, and Efficient Resource Discovery) in pervasive computing environments//Proceedings of the IEEE International Conference on Information Technology (ITCC 2005). Las Vegas,NV,USA,April 2005:271-276
  • 3Sharmin M, Ahmed S, Ahamed S I. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for Mobile Devices of Pervasive Computing Environments//Proceedings of the 3rd International Conference on Information Technology: New Generations (ITNG 2006). Las Vegas, Nevada, USA, April 2006 :306-313
  • 4Rehak M, Foltyn L, Pechou cek M, et al. Trust model for open ubiquitous agent systems//Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT). Washington, DC, USA, September 2005 : 536-542
  • 5He R, Niu J, Zhang G. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing//Pan Y, Chen D,Guo M, et al. , eds. Proceedings of the Third International Symposium on Parallel and Distributed Processing and Applications (ISPA 2005). Nanjing, China, November 2005:541-552
  • 6He R,Niu J,Yuan M,et al. A novel cloud-based trust model for pervasive computing//Proceedings of the Fourth International Conference on Computer and Information Technology (CIT'04). Wuhan, China, September 2004 : 693-700
  • 7He R,Niu J, Hu K. A novel approach to evaluate trustworthiness and uncertainty of trust relationships in peer-to-peer computing// Proceedings of the Fifth International Conference on Computer and Information Technology (CIT'05). Shanghai, China, September 2005 : 382-388
  • 8Almenarez F, Marin A, Dyaz D, et al. Developing a model for trust management in pervasive devices//Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06). Pisa, Italy, March 2006:267-271
  • 9Haque M M, Ahamed S I. An omnipresent formal trust model (FTM) for pervasive computing environment//Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007). Beijing, China,July 2007: 49-56
  • 10郭亚军,洪帆.普适计算的信任计算模型[J].计算机科学,2005,32(10):59-62. 被引量:6

二级参考文献22

  • 1Weiser M. The computer for the twenty-first century. Scientific American , 1991,265 (3): 94~ 104
  • 2Lmsal P. Requirements for modeling trust in ubiquitous computing and Ad Hoc networks. In HUT TML- Course T-110. 557-Publication ISBN 951-22-6309-2 ISSN 1456-7628 TML-C8, Ad Hoc Mobile Wireless Networks - Research Seminar on Telecommunications Software, Autumn 2002. http:∥www. tml. hut. fi/Studies/T- 110. 557/2002/papers/
  • 3McKnight D H, Chervany N L. The meanings of trust. In Working Paper 96-04, Management Information Systems Research Center. Carlson School of Management, University of Minnesota,1996. Last revised: April 1, 2000
  • 4Gray E, Seigneur J M, Chen Y, Jensen C. Trust propagation in small worlds. In: Nixon P, Terzis S, eds. Proc. of the First Intl.Conf. on Trust Management (iTrust2003), volume 2692 of Leeture Notes in Computer Science, Heraklion, Crete, Greece, May 2003. 239~254
  • 5Gray E, et al. Towards a framework for assessing trust-based admission control in collaborative ad hoc applications: [Technical Report 66]. Department of Computer Science, Trinity College Dublin, 2002
  • 6Grandison T, Sloman M. A survey of trust in Internet applications. IEEE Communications Surveys and Tutorials, 2000,4 (4):2~16
  • 7Carbone M, Nielsen M. A formal model for trust in dynamic networks. In: Proc. of IEEE International Conference on Software Engineering and Formal Methods (SEFM '03), Brisbane, Australia , Sept. 2003
  • 8Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In:Proc. of the 1996 IEEE Symposium on Security and Privacy,Oakland, CA,USA,May 1996. 164~173
  • 9Blaze M, Feigenbaum J, Ioannidis J, Keromytis A. The KeyNote trust-management system, version 2. IETF, RFC 2704, Sept.1999
  • 10Kagal L,Finin T,Joshi A. Trust-based security in pervasive computing environments. IEEE Computer, December 2001,34 ( 12 ):154~157

共引文献5

同被引文献48

  • 1张春瑞,江帆,徐恪.面向对等网络应用的信任与名誉模型[J].清华大学学报(自然科学版),2005,45(10):1436-1440. 被引量:10
  • 2曾文艺,于福生,李洪兴.区间值模糊推理[J].模糊系统与数学,2007,21(1):68-74. 被引量:12
  • 3李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 4Romfin M, Hess C,Cerqueira R, et al. Gaia:A middleware infrastructure to enable active spaces. IEEE Pervasive Computing, 2002,1(4) :74-83
  • 5Romn M, Hess C, Cerqueira R, et al. Gaia:A middleware platform for active spaces. ACM SIGMOBILE Mobile Computing and Communications Review,2002,6(4):65-67
  • 6Sharmin M, Ahmed S, Ahamed S I. MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) for mobile devices of pervasive computing environments// Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006). Las Vegas, Nevada, USA, April 2006 : 306-313
  • 7Lewellyn-Jones D, Merabti M, Shi Q, et al. A security framework for executables in a ubiquitous computing environment// Proceedings of Globecom 2004. Dallas, USA, November 2004: 2158-2163
  • 8Hill R, Al-Muhtadi J, Campbell R, et al. A middleware architecture for securing ubiquitous computing cyber infrastructures. IEEE Distributed Systems Online, 2004,5 (9) : 1 - 14
  • 9Kalasapur S , Kumar M , Shirazi B. Evaluating service oriented architecture (SOA) in pervasive computing//Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2006). Pisa, Italy, March 2006 : 276-285
  • 10Shirazi B,Kumar M, Sung B Y. QoS middleware support for pervasive computing applications//Proceedings of the 37th Annual Hawaii international Conference on System Sciences (HICSS' 04). Big Island, Hawaii,USA,January 2004..294-303

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部