期刊文献+

基于自动信任协商的可信移动代码验证方法

ATN Based Trust Mobile Code Verification
下载PDF
导出
摘要 移动代码具有智能型和移动性,对目标主机平台构成安全威胁.现有对移动代码的授权和认证方法多是以可信第三方的直接授权为基础.本文针对目前开放网络的特点,提出一种基于自动信任协商(ATN)的移动代码保护方法(ATMCVM),该模型通过逐步披露证书的方法能够解决两个陌生的代码生产者和消费者间动态建立信任关系的问题. With the development of Internet, the problem of mobile code security emerges as one of the most challenges of research in Computer Science today. ATN based Trust Mobile Code Verification Model (ATMCVM) is proposed in this paper, which establishes the trust between strangers with iterative disclosure of credentials and security policies.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2009年第2期22-25,29,共5页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 国家"863计划"项目资助(2007AA01Z4102007AA01Z177)
关键词 移动代码安全 属性证书 信任协商 mobile code security property-based digital credentials automated trust negotiation(ATN )
  • 相关文献

参考文献8

  • 1卢兴华,赵强,刘志明,王红胜.安全通过方式——移动代码安全的新方法[J].计算机工程,2004,30(6):135-136. 被引量:1
  • 2郭帆,陈意云,胡荣贵.基于语言的移动代码安全问题[J].计算机科学,2002,29(11):110-114. 被引量:2
  • 3Winsborough W H, Seamons K E, Jones V E. Automated Trust Negotiation[C]// DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000:88 - 102.
  • 4Barlow T, Hess A, Seamons K E. Trust Negotiation in Electronic Markets[ C]// Proc. of the 8th Research Symp. in Emerging Electronic Markets. Maastricht, 2001 : 1 - 11.
  • 5Bina E, Jones V, McCool R, et al. Secure Access to Data Over the Internet[ C]// Proceedings of the Third ACM/ IEEE International Conference on Parallel and Distributed Information Systems, Austin, Texas, 1994:99- 102.
  • 6Skogsrud H, Benatallah B, Casati F. Trust-Serv: Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services[C]//Proc. of the 13th Int'l World Wide Web Conf. (www 2004). New York: ACM Press, 2004: 53 - 62.
  • 7李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 8廖振松,金海,李赤松.基于属性的信任协商模型[J].华中科技大学学报(自然科学版),2006,34(5):30-32. 被引量:3

二级参考文献22

  • 1Abadi M, Burrows M, Lampson B, et al. A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 1993, 15(4): 706-734.
  • 2Cohen G, Chase J, Kaminsky D. Automatic Program Ttranstbrmation with JOIE. In:Proceedings of the 1998 Usenix Annual Technical Symposium, New Orleans, Louisiana,1998-06.
  • 3Cheswick W R, Bellovin S M. Firewalls and Internet Security,:Repelling the Wily Hacker. Addison-Wesley. 1994.
  • 4Necula G C,Lee P. Safe Kernel Extensions Without Run-Time Checking. In: Proc. of the 2nd Symposium Operationing System Design and Implementation(OSDI'96), Seattle, Oct. 1996. 229~243
  • 5Necula G C, Lee P. Proof-carrying code. In: Nell D. Jones, ed. Conf. Record 24th Symposium on Principles of Programming Languages(POPL'97) ,Paris,Jan. 1997. 106~119
  • 6Necula G C. Compiling with Proofs: [PhD thesis]. Carnegie Mellon University Oct. 1998. Available as Technical Report CMUCS-98-154
  • 7Necula G C, Lee P. Efficient representation and validation of proofs. In: Proc. 13th Symp. Logic in Computer Science, IEEE,June. 1998,93~104
  • 8Necula G C,Lee P. The design and implementation of a certifying compiler. In:Proc. Conf. Programming Language Design and Implementation, ACM SIGPLAN, 1998. 333~ 344
  • 9Lee P,Necula G C. Research on Proof-Carrying Code on MobileCode Security. In:Proc. of the Workshop on Foundations of Mobile Code Security, Monterey, 1997
  • 10Necula G C,Lee P. Proof Generation in the Touchstone Theorem Prover. In: Proc. of the 17th Intl. Conf. on Automated Deduction, Pittsburgh, 13 June 2000

共引文献54

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部