期刊文献+

自动信任协商中敏感资源安全防护研究 被引量:1

Research on Privacy-preservation in automated Trust Negotiation
下载PDF
导出
摘要 自动信任协商是一种新型的访问控制方法。在协商过程中,双方的交互信息(证书,策略)具有敏感性。在安全级别要求较高的应用环境下,对信任协商过程中的敏感信息进行安全防护具有重要意义。针对基于密码体制敏感资源安全防护方法进行了系统的分析,总结了各机制的安全特性和优缺点,并对其未来发展趋势进行了展望。 Automated trust negotiation is the rising method of access control.Some information (credential, policy) is private in the communication of trust negotiation.So it is very important to protect privacy information under the high security required environment.This paper analyze the latest privacy-preservation schemes based on cryptography.The character of security、excellence and pitfalls in these schemes are summarized.Finally the development trend for privacy-preservation in ATN is proposed.
出处 《计算机安全》 2009年第7期14-19,共6页 Network & Computer Security
关键词 自动信任协商 敏感信息 隐藏证书 无记忆属性证书 automated trust negotiation privacy information hidden credential oblivious attribute certificates
  • 相关文献

参考文献10

  • 1Woodruff D.Revisiting the efficiency of malicious two-party computation[].Proc EUROCRYPT.2007
  • 2Jiangtao Li,Ninghui Li.OACerts:Oblivious attribute certificates[].Proceedings of therd Conference on Applied Cryptography and Network Security.2005
  • 3Frikken K,Li J.Trust negotiation with hidden credentials,hidden policies,and policy cycles[].th Annual Network and Distributed System Security Symposium.2006
  • 4Hoepman J H.Private Handshakes[].Conference on Security and Privacy in Ad hoc and Sensor Networks.2007
  • 5Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Management[].Proceedings of the th Symposium on Security and Privacy.1996
  • 6Feigenbaum J,Stauss M.Compliance Checking in the Policy Maker Trust Management System[].Proceedings of Financial Crypto’.1998
  • 7William H Winsborough,N. Li.Towards Practical Automated Trust Negotiation[].Proceedings of the rd International Workshop on Policies for Distributed Systems and Networks(POLICY’).2002
  • 8Winsborough W H,Li N.Safety in automated trust negotiation[].Proceedings of the IEEE Symposium on Security and Privacy.2004
  • 9Yao A.How to Generate and Exchange Secrets[].Proceedings of the th IEEE Symposium on Foundations of ComputerScience.1986
  • 10SEAMONS K E,,WINSLETTM YUTing,et al.Protecting privacyduring on-line trust negotiation[].Proc of the nd Workshop on Privacy Enhancing Technologies.2003

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部