期刊文献+

DTM:一种面向网络计算的动态信任管理模型 被引量:14

DTM:A Dynamic Trust Management Model for Internet Computing Environments
下载PDF
导出
摘要 在开放的互联网中,信任关系的建立是实现跨自治域资源共享与协同的前提.然而,网络计算环境的分布自治特性,使得各类复杂系统中应用不同的信任管理机制,容易导致信任定义的不一致问题,特别是很多系统为支持多域协作,直接假设实体间信任具有传递特性,而在模型中缺乏该性质成立的条件;此外,网络计算环境中的动态演化特性,使得驱动实体间协作的信任关系随需而变,而现有信任管理模型仅仅关注于系统功能结构,缺乏对这种动态性的描述.文中提出了一种动态信任管理模型DTM,基于信念公式形式化定义了主体间的信任公式,并将信任的传递特性(信任链)解释为模型的一条性质.在该模型中,针对信任关系的动态特征,以时间为参量刻画主体公式集,以事件为触发条件刻画主体间信任的变化,并基于正则事件序列描述信任管理的资源授权过程,可刻画主体间信任的建立过程.最终,设计、实现了一个信任管理系统CROWN-TM,并进行了初步实验分析. Nowadays, many novel computing technologies such as Pervasive Computing and Grid Computing have emerged to empower resource sharing and collaboration over Internet. However, trust establishment across multiple autonomous domains has become an important issue because resources are dynamic and behaviours are uncontrollable over Internet. Firstly, existing trust management solutions and systems lack of a unified model, specially the definitions of trust in several security mechanisms are inconsistent, moreover there is no formal proof on trust transitive property referring to the trust management model. Additionally, dynamic short-lived collaboration among entities frequently happens, which may require the trust relationship among collaborating entities to be changed on demand. Therefore, this paper proposes a dynamic trust management model (DTM) to support flexible trust establishment between unfamiliar entities, in which the concept of trust is formally defined based on a belief formula, and the transitive property of trust (trust chain) is proved. In this model, an event is used to describe the cause of trust relationship evolution between principals. A regular event sequence is employed to describe the resource authorization process, and a dependent sequence on regular event sequences is designed for the resource authorization process of trust negotiation. Finally, a trust management system in CROWN middleware, and some preliminary experiments are conducted and the experimental results are given and analysed.
出处 《计算机学报》 EI CSCD 北大核心 2009年第3期493-505,共13页 Chinese Journal of Computers
基金 国家"九七三"重点基础研究发展规划项目基金(2005CB321803) 国家"八六三"高技术研究发展计划项目基金(2007AA01Z426 2007AA01Z120) 国家杰出青年基金(60525209) NSFC-RGC联合项目(60731160632)资助~~
关键词 网络计算 信任模型 信任管理 信任协商 信任证 安全策略 Internet computing trust model trust management trust negotiation credential security policy
  • 相关文献

参考文献28

  • 1Maurer U. Modeling a public-key infrastrueture//Proceedings of the European Symposium on Research in Computer Security (ESORICS). London, UK, 1996:325-350.
  • 2Lampson B, Abadi M, Burrows M, Wobber E. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 1992, 10(4) : 265-310.
  • 3Burrows M, Abadi M, Needham R M. A logic of authentication//Proceedings of the Royal Society of London A, 1989: 233-271.
  • 4Blaze M, Feigenbaum J, Lacy J. Decentralized trust management//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 1996 :164-173.
  • 5Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust management framework//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Berkeley, California, 2002:114-130.
  • 6Jim T. SD3: A trust management system with certified evaluation//Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, California, USA, 2001:106-115.
  • 7Freudenthal E, Pesin T, Port L, Keenan E. dRBAC: Distributed role-based access control for dynamic coalition environments//Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS' 02). Vienna, Austria, 2002:411-420.
  • 8Chu Y-H, Feigenbaum J, LaMaechia B, Resniek P, Strauss M. REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems, 1997, 29(8/13): 953-964.
  • 9Hintikka J. Knowledge and Belief. New York.. Cornell University Press, 1962.
  • 10Cohen P R, Levesque H J. Intention is choice with commitment. Artificial Intelligence, 1990, 42(2-3).. 213-261.

二级参考文献40

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 3Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 4Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 5Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 6Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 7Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 8Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 9Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
  • 10Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139.

共引文献129

同被引文献164

引证文献14

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部