期刊文献+

P2P权限委托与访问控制模型 被引量:1

Privilege Delegation and Access Control Model for P2P
下载PDF
导出
摘要 提出了一种P2P权限委托与访问控制模型,该模型包括3个主要协议,即权限委托协议、资源检索协议和访问控制协议。根据权限委托协议,委托发起方PEER_S选择信誉值高的对等点作为受委托对等点PEER_D,颁发权限委托证书Cd。按资源检索协议,PEER_D选择信誉值高的资源提供者发送资源请求。根据访问控制协议,资源提供者PEER_R通过资源请求者的信誉证书集Cts和权限委托证书Cd进行访问控制。基于着色Petri网验证协议模型的可达性等性质,使用CPN Tools对协议进行模拟仿真。 This paper presents a privilege delegating and access control model for P2P. This model includes three main protocols, such as privilege delegate protocol, resources search protocol, and access control protocol. Privilege delegate protocol defines that the task initiator, PEER_S selects delegated peers PEER D who will delegate PEERS to finish tasks with highest trust value, and awards privilege delegation certificate Cd. The resources search protocol defines that PEER_D send resource request to the provider with the highest trust value. The resource access protocol defines the PEER_R access control of resource with the credit certificates Cts and privilege delegation certificate Cd of requesting peers. By CPN Tools, the protocols are simulated based on the characteristics with colored Petri-net, such as teachability.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第4期165-166,169,共3页 Computer Engineering
关键词 对等网 权限委托 信誉 PETRI网 P2P privilege delegation reputation Petri nets
  • 相关文献

参考文献4

  • 1Ford W, Solo D. Interact X.509 Public Key Infrastructure Certificate and Certificate Revocation List Profile[S]. RFC 3280, 2002.
  • 2Feisthammel P. Explanation of the Web of Trust of PGP[EB/OL]. (2006-02-07). http://www.rubin.ch/pgp/weboftrust.en.html.
  • 3Rcsnick P, Zeckhauser R, Friedman E, et al. Reputation Systems[J]. Communications of the ACM, 2000, 43(12): 45-48.
  • 4Frantz B, Lampson R R. SPKI Certificate Theory[S]. RFC 2693, 1999.

同被引文献13

  • 1林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 2MooreD HebelerJ 苏忠 战晓雷译.对等网[M].北京:清华大学出版社,2003..
  • 3Azuri C.iPoque, Intemet study 2007-P2P file sharing still dominates the world wide Internet[EB/OL].[2012-12-15]. http ://www.ipoque.com.
  • 4The true picture of Peer-to-Peer file-sharing[EB/OL]. [2012-12-15 ] .http ://www.Cache-lo gic.com/researh/Cache- Logic_Analyst_Presnetationjuly2004.Pdf.
  • 5Nguyen N D,Le X N,Yonil Z,et al.Enforcing access control using risk assessment universal multiservice net- works[C]//Proceedings of the 4th European Conference on Universal Multiservice Networks.Washington DC: IEEE Computer Society, 2007.
  • 6Azzedin F,Masheswaran M.Trust modeling for peer-to- peer based computing systems[C]//Proceedings of the 17th International Symposium on Parallel and Distributed Processing.Washington DC : IEEE Computer Society,2003.
  • 7Paul C, James D,Victor G.Social network model of con- struction[J].Journal of Construction Engineering and Man- agement, 2008,134(10) :804-812.
  • 8雷建云,崔国华,章丽平,邢光林.可计算的基于信任的授权委托模型[J].计算机科学,2008,35(10):73-75. 被引量:7
  • 9封孝生,王桢文,黎湘运.P2P中基于信任和属性的访问控制[J].计算机科学,2011,38(2):28-31. 被引量:4
  • 10刘义春,张焕国.基于Bayesian信任网络的P2P访问控制[J].小型微型计算机系统,2011,32(6):1059-1063. 被引量:2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部