期刊文献+

基于信任度的网格安全访问模型的研究 被引量:3

Research of the Grid Security Model for Visit Based on the Trust
下载PDF
导出
摘要 网格安全问题一直是网格研究的核心问题和难点。文中尝试以信任度评判机制来衡量网格系统中的访问可信度,基于建立的信任度模型,将信任度动态评判方法引入到网格安全访问模型中,并论证了在网格系统安全中引入信任度评估机制的可行性和合理性。 The Grid security issue is the core problem and difficulty of the Grid research. This paper attempts to develop a trust evaluation mechanism to measure the Grid system visit credibility. Based on this trust model, it describes the dynamic evaluation method to the visit model of the Grid system security, and gives the proof of the possible rationality of this practice.
作者 王诚 张祖昶
出处 《南京邮电大学学报(自然科学版)》 2009年第3期78-82,共5页 Journal of Nanjing University of Posts and Telecommunications:Natural Science Edition
关键词 网格 网格安全 安全模型 信任度 Grid Grid security security model trust
  • 相关文献

参考文献8

二级参考文献85

  • 1王莉苹,杨寿保.网格环境中的一种信任模型[J].计算机工程与应用,2004,40(23):50-53. 被引量:32
  • 2干志勤,曾国荪.网格环境下的基于行为的信任评估模型[J].计算机应用与软件,2005,22(2):62-64. 被引量:14
  • 3朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 4Foster I, Kesselman C. Globus project [ EB/OL]. http ://www. globus. org. 2001.
  • 5Tuecke S. Grid security infrastructure(GSI) roadmap[EB/OL], http://www. gridforum, org/security/ggfl-2001-03/drafts/ draft-gridforum-gsi-roadmap-02, txt. 2001.
  • 6Foster I, Kesselman C, Tsudik G, et al. A security architecture for computational grids[A]. In: Reiter M, ed. Proceedings of the 5^th ACM conference on computer and communications security[J]. New York: ACM Press, 1998.83 ~ 91.
  • 7Jackson K, Tuecke S, Engert D. TLS delegation protocol [ EB/OL].http: //www. gridforum, org/security/ggf1-2001-03/drafts/draft- ggf-tlsdelegation-09, txt, 2001.
  • 8Tuecke S, Engert D, Foster I. Internet X .509 public key infrastructure proxy certificate profile [ EB/OL]. http://caops. es. net/documents/certprofile, doc, 200.1.
  • 9Wong C, Gouda M, Lain S. Secure group communications using key graphs[ EB/OL]. hup://www.acm. org/sigcomm/sigcomm98/ rp/paper06, pdf, 1998.
  • 10Weiser M. The computer for the twenty-first century. Scientific American , 1991,265 (3): 94~ 104

共引文献213

同被引文献18

  • 1陈博,迟学斌,武虹.计算网格Portal的设计与实现[J].微电子学与计算机,2004,21(9):15-18. 被引量:11
  • 2王伟,殷国富,张雪平.基于Microsoft.NET的有限元应用网格门户研究[J].计算机集成制造系统,2006,12(3):476-480. 被引量:5
  • 3Yu Jia, Buyya R. A taxonomy of scientific workflow systems for grid computing[J].ACM SIGMOD Record, 2005,34 (3) : 44-49.
  • 4Sandhu R,Coyne E, Feinstein H, et al. Role-Based Access Control Model[J].IEEE Computer, 1996,29 (2) : 38- 47.
  • 5Keahey K, Welch V. Fine Grain Authorization for Resource Management in the Grid Environment[C]//Proceedings of Grid 2002 Workshop. 2002.
  • 6Liu Limin, Xu Zhiwei. A Layered Grid User Expression Model in Grid User Management[C]//Grid and Cooperative Compuring PT2. 2004,3033 : 1055-1058.
  • 7Thomas J,Paci F, Bertino E,et al.User tasks and access controlover web services[C].Proceedings of the 15th IEEE InternationalConference on Web Services,2007.
  • 8Dou W, Cheung SC,Chen G,et al.Certificate-driven grid work-flow paradigm based on service computing[C].Lecture Notes inComputer Science,2005:155-160.
  • 9Liu Limin,Xu Zhiwei.A layered grid user expression model ingrid user management [C]. Grid and Cooperative Computing,2004:1055-1058.
  • 10Jia Yu,Rajkumar Buyya.A taxonomy of scientific workflow sys-tems for grid computing[J].ACM SIGMOD Record,2005,34(3):44-49.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部