期刊文献+

吝啬语义信任协商 被引量:4

Parsimonious Semantic Trust Negotiation
下载PDF
导出
摘要 自动信任协商是通过数字证书的交互披露在陌生实体间建立信任的过程,现有的自动信任协商框架要求主体出示完整属性证书来证明自己满足对方资源披露策略中的身份断言约束条件,导致了属性证书中身份信息过度披露问题.该文中作者提出一种通过交换DL-TNL语义身份断言来建立信任关系的吝啬语义信任协商框架,避免了完整属性证书的直接出示,减少信任建立过程中身份信息被披露的程度,并提出一种正确、完备且有效的吝啬语义信任协商策略.在该策略下,交易双方的协商引擎可以快速有效地从由身份断言权威签发的包含多个DL-TNL语义身份断言的身份断言证书中,自动计算出批露最少信息且符合对方策略的身份断言集进行出示,以最大限度地减少信任建立过程中被披露的身份信息,并保证理论上存在成功可能性时,使用该策略必然可以有效地帮助主体最终获得网络资源的访问权限.有关该策略完备性和正确性的证明以及策略实施中所使用的符合性检测算法的实现和分析均在文中给出. Automated Trust Negotiation (ATN) is a process in which two unfamiliar entities ex- change their digital attribute certificates in turn to set up mutual trust relationship with each oth- er. Since existing ATN frameworks require entities to release entire attribute certificates to prove that they satisfy the identity constraint condition stated by the other entities' access control poli- cies, private identity information of entities is often over-revealed in many circumstances. In this paper, the authors propose a novel parsimonious semantic trust negotiation framework in which entities can build trust relationship by exchanging DL-TNL semantic identity assertions instead of entire attribute certificates. This framework can greatly reduce the degree of disclosed private identity information. Under the framework, the authors propose a correct, complete and efficient parsimonious semantic trust negotiation strategy to allow the negotiation agencies of participants to compute and disclose a satisfying set of DL-TNL assertions which contains least private identi- ty information at every exchange step. In a word, the parsimonious semantic trust negotiation strategy can minimize the disclosed private identity information in the trust negotiation processes and guarantees the resource requesters participating in the processes to get the access rights finally if there does exist a theoretical successful trust negotiation sequence. All of the proofs about the properties of the strategy are given in this paper, so are the relevant compliance checking al gorithms and their analyses.
作者 张妍 冯登国
出处 《计算机学报》 EI CSCD 北大核心 2009年第10期1989-2003,共15页 Chinese Journal of Computers
基金 国家"八六三"高技术研究发展计划项目基金(2007AA120404 2007AA120405)资助
关键词 自动信任协商 语义方法 隐私保护 协商策略 符合性检测 automated trust negotiation semantic method privacy protection trust negotiation strategy compliance checking
  • 相关文献

参考文献14

  • 1Bertino E, Ferrari E, Squicciarini A C. Trust-X: A peer to peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):827-842.
  • 2Nejdl W, Olmedilla D, Winslett M. PeerTrust: Automated trust negotiation for peers on the semantic Web//Proceedings of the Secure Data Management. Toronto, Ontario, Canada,2004:118-132.
  • 3李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 4Winsborough W, Seamons K, Jones V. Automated trust negotiation. North Carolina State University at Raleigh: Technical Report TR-2000-05, 2000.
  • 5Yu Ting, Ma Xiao-Song, Winslett M. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet//Proceedings of the ACM Conference on Computer and Communications Security. New York, 2000: 210-219.
  • 6Smith B, Seamons K E, Jones M D. Responding to policies at runtime in Trust Builder//Proceedings of the 5th International Workshop on Policies for Distributed Systems and Networks. Washington, 2004:149-158.
  • 7Lee J A, Winslett M. Towards an efficient and language-agnostic compliance checker for trust negotiation systems//Proceedings of the 3rd ACM Symposium on Information, Computer and Communications Security. Tokyo, Japan, 2008: 228-239.
  • 8李建欣,怀进鹏.COTN:基于契约的信任协商系统[J].计算机学报,2006,29(8):1290-1300. 被引量:18
  • 9Li Jiang-Tao, Li Ning Hui. OACerts: Oblivious attribute certificates//Proceedings of the 3rd Conference on Applied Cryptography and Network Security. New York, 2005: 122- 138.
  • 10Bauer D, Blough M D, Cash D. Minimal information disclosure with efficiently verifiable credentials//Proceedings of the 4th ACM workshop on Digital Identity Management. Virginia, 2008, 15-24.

二级参考文献20

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2Chadwick D. W. , Otenko A.. The PERMIS X. 509 role based privilege management infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, California, USA, 2002, 135-140
  • 3Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the IEEE Symposium on Securityand Privacy, Oakland, CA, USA, 1996, 164-173
  • 4Li N. , Mitchell J. C. , Winsborough W. H.. Design of a Role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 2002, 114-130
  • 5Clarke D. , Ellen J. E. , Ellison C. , Fredette M. , Morcos A. ,Rivest R. L.. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 6Winsborough W. H. , Seamons K. E. , Jones V.E.. Automated trust negotiation. In: Proceedings of the DARPA Information Survivability Conference and Exposition, 2000, 88-102
  • 7Yu T. , Winslett M. , Seamons K.E.. Supporting structured credentials and sensitive policies through interoperahle strategies for automated trust negotiation. ACM Transactions on Information and System Security(TISSEC), 2003, 6(1): 1-42
  • 8Sun H., Zhu Y., Hu C., Huai J., Liu Y., Li J.. Early experience of remote and hot service deployment with trustworthiness in CROWN grid. In: Proceedings of the 6th International Workshop on Advanced Parallel Processing Technologies,Hong Kong, China, 2005, 301-312
  • 9Foster I. , Kesselman C. , Tuecke S.. The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 2001,15(3) : 200-222
  • 10Thompson M. R., Essiari A., Mudumbai S.. Certificatebased authorization policy in a PKI environment. ACM Transactions on Information and System Security(TISSEC), 2003, 6(4): 566-588

共引文献63

同被引文献35

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部