期刊文献+

一种基于多步直接传播的网格信任模型 被引量:1

A Trust Computing Model Based on Multi-step Propagate Mechanism in Grid
原文传递
导出
摘要 网格由广域分布的、异构的计算资源组成,将任务分配给远程节点执行常会引起多种安全问题,因此需要有效的任务管理机制保证任务和资源的安全性和可靠性。提出一种基于多步直接传播的网格信任模型,模型根据用户和资源间已有执行经验对信任值的影响,采用多步直接传播方式计算节点信任值,实现了信任值的分布式计算,有效解决因网格动态性引起的信任值计算开销问题。 Grid resources are heterogeneous, geographically distributed and dynamically available. A job dispatched to a remote site may fail due to experiencing some infections or malicious attacks, and therefore a judicious job management mechanism is needed to engage in the security and privacy concerns. In this paper, a trust computing model based on the multi-step propagate mechanism is proposod. The trust value is ealculated according to the execution experiences between users and resources, and the distributed ealeulation of the trust value is implemented, therefore the overhead brought by the dynamics of the Grid is decreased.
作者 何岩 郑春瑛
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2009年第18期168-171,共4页 Journal of Wuhan University of Technology
关键词 网格 安全 信任 多步直接传播 grid security trust multi-step propagate
  • 相关文献

参考文献6

  • 1I. Foster, C. Kesselman. The Grid: Blueprint for a Future Computing Infrastructure[ M]. San Francisco: Morgan Kaufmann Publishers, 1999.
  • 2M. Humphrey, M. Thompson. Security Implications of Typical Grid Computing Usage Scenarios[J]. Cluster Computing,2002, 5(3): 51-61.
  • 3Shanshan Song, Yu-Kwong Kwok,Kai Hwang. Security-Driven Hettristics and a Fast Genetic Mgorithm for Trusted Grid Job Scheduling [ C ]//Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05), IEEE Computer Society 2005.
  • 4Butt, Ali Raza; Adabala, Sumalatha; Kapadia, Nirav H. ; Figueiredo, Renato J. ; Fortes, Jose A.B.. Grid-computing portals and security issues[J]. Journal of Parallel and Distributed Computing,2003,63( 10):1006-1014.
  • 5C. Ziegler, G. Lausen. Spreading Activation Models for Trust Propagation. In: Proceedings of the IEEE International Conference on e- Technology, e-Commerce, and e-Service, Oakland[ J]. IEEE Computer Press. 2004,83-97.
  • 6R. Guha, R. Kumar, P. Raghavan,et al. Propagation of Trust and Distrust[C]//In: Proceedings of the 13th International WWW Conferece (WWW2004). New York: ACM Press, 2004:403-412.

同被引文献9

  • 1张荣清,李建欣,怀进鹏.网格计算环境中的安全信任协商系统[J].北京航空航天大学学报,2006,32(3):347-351. 被引量:4
  • 2Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Management[C]//Proceedings of the 17th Symposium on Securityand Privacy.Los Alamitos:IEEE Press,1996:164-173.
  • 3Winsborough W H,Seamons K E,Jones V E.Automated Trust Negotiation[C]//Proceedings of DARPA InformationSurvivability Conference and Exposition.Los Alamitos:IEEE Press,2000:88-102.
  • 4Castelluccia C,Jarecki S,Tsudik G.Secret Handshakes from Ca-oblivious Encryption[C]//Advances in Cryptology-ASIACRPT 2004:10th International Conference on the Theory and Application of Cryptology and Information Security.New York:Springer Press,2004:293-307.
  • 5Li N,Du W,Boneh D.Oblivious Signature-based Envelope[C]//Proceedings of the 22th ACM Symposium on Principlesof Distributed Computing(PODC 2003).New York:ACM Press,2003:182-189.
  • 6Holt J,Bradshaw R,Seamons K,et.al.Hidden Credentials[C]//2nd ACM workshop on Privacy in the Electronic Soci-ety.New York:ACM Press,2003:1-8.
  • 7Balfanz D,Durfee G,Shankar N,et al.Secret Handshakes from Pairing-Based Key Agreements[C]//Proceedings of the2003IEEE Symposium on Secret and Privacy.Los Alamitos:IEEE Press,2003:80-196.
  • 8Yu T,Winslett M,Seamons K E.Supporting Structured Credentials and Sensitive Policies Through Interoperable Strat-egies for Automated Trust Negotiation[J].ACM Transactions on Information and System Security(TISSEC),2003,6(1):1-42.
  • 9廖俊国,洪帆,李俊,杨木祥.在信任协商中保密证书的敏感属性[J].通信学报,2008,29(6):20-25. 被引量:7

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部