期刊文献+

基于自动信任协商的可信网络研究 被引量:2

Study of Trusted Network Based on Automated Trust Negotiation
下载PDF
导出
摘要 网络安全应该是立体的,可信平台仅仅在一定程度上保证了终端的安全,应用层的安全依靠的是信息交互双方的安全访问控制。自动信任协商是建立可信网络客户端和服务器端信任关系的有效办法。文中在可信平台的基础上构建了可信网络结构,根据自动信任协商理论提出了可信网络的信任协商模型,分析了基于自动信任协商的可信网络的访问控制和策略协商问题,在理论上分析了可信网络的框架模型。给出了在P2P网络中的典型应用示例,为可信网络的应用建模提供了参考。 Safe network should be all - directional, trusted platform only sure terminal safety to a certain degree, .safety on application layer is based on access control of information inter - action both sides. Automated trust negotiation is an affective means to build the relation on client and server. Builds a trusted network structure based on trusted platform, and gives trusted model of trusted network according to automated trust negotiation theory, and analyses the problems of access control and measure negotiation on trusted network based on automated trust negotiation. Also analyses frame model of trusted network in theoretically. Finally, a classic application example on peer- to- peer network is provided, which provides reference to the application modeling of trusted network.
作者 李熊达 何利
出处 《计算机技术与发展》 2009年第9期150-153,180,共5页 Computer Technology and Development
基金 重庆市自然科学基金(CSTS2007BB2445) 重庆邮电大学青年自然科学基金(A2008-34)
关键词 可信网络 自动信任协商 可信计算平台 trusted network automated trust negotiation trusted computing platform
  • 相关文献

参考文献10

  • 1CG Specification Architecture Overview Specification (Revisiord - 2 ) [EB/OL]. 2004. https://www.tmstedcom- putinggroup. org/downloads/TCG - 1_ 0 Architecture Overview pdL.
  • 2Trusted Mobile Platform Specification Hardware Architecture Description [ EB/OL ]. 2004. http://www.trustedmobile. org/TMP_ HWAD_ rev100. pdf.
  • 3李菲,乔佩利.网络深层防御体系模型的研究和实现[J].计算机技术与发展,2008,18(2):159-162. 被引量:1
  • 4Trusted Computing Group(TCG). TCG Specification Version 1.2 Revision 62. TPM Main Part 1: Dsign Principles [ EB/ OL]. 2003 - 10. https://WWW.trustedcomputinggroup.org/downloads/tpmwg - mainrev 62 Part 1 Design Principles.pdf.
  • 5Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation[ C]//In: DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000: 88- 102.
  • 6赵纪涛,马莉,王现君,尚光龙.一种自适应的模糊关联规则挖掘算法[J].计算机技术与发展,2008,18(5):64-66. 被引量:7
  • 7Trusted Computing Group. TNC IF - IMC Specification v1. 2 [ EB/OL]. 2007 - 02. https://www. trustedcomputinggroup. org/downloads/TCG - 3_ 0 Architecture Overview pdL.
  • 8Trusted Computing Group. TNC IF - IMV Specification v1. 2 [ EB/OL]. 2007 - 02. https://www.trustedcomputinggroup.org/downloads/TCG - 4_ 0 Architecture Overview pdL.
  • 9Balfe S, Lakhani A D, Paterson K G. Securing peer- to - peer networks using trusted computing[ M]. [ s. I. ]: IEEE Press, 2005 ;271 - 298.
  • 10Sailer R, Zhang R. Design and implementation of a TCG - based integrity measurement architecture[C]//Proceedings of the 13th Unix Security Symposium. San Diego: [s. n. ] ,2004.

二级参考文献12

共引文献6

同被引文献17

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部