期刊文献+

一种基于时间域和信任度的分布式证书链搜索算法 被引量:1

A Time Domain and Trustworthiness-Based Distributed Credential Chain Discocery Algoritnm
下载PDF
导出
摘要 在分布式系统中在分布式环境中,基于目标的分布式证书链搜索算法的提出,找到并检索出所需要的证书,但是目前得信任管理系统还存在以下不足:⑴委托深度没有得到控制;⑵证书的有效期没有得到体现。针对上述问题,提出了一种基于时间域和信任度的分布式证书链搜索算法,并结合具体的例子给出了该算法的使用。 In the distributed environment, the goal-directed, distributed chain discoyery algorithm finds and retrieves credentials needed. However, the exiting trust management systems have some flaws as follows: (1) delegation depth is not controlled effectively. (2) the validity of the certificate has not been reflected. To address the problems above, this paper proposes a time domain and trustworthiness-based distributed credential chain discovery algorithm, and gives a specific example of the algorithm.
出处 《计算机系统应用》 2010年第2期139-142,146,共5页 Computer Systems & Applications
关键词 信任管理 分布式 证书链 信任域 时间域 trust management distribution credential chain trustworthiness time domain
  • 相关文献

参考文献9

二级参考文献87

共引文献48

同被引文献7

  • 1刘鹏,刘欣,陈钟.信任管理研究综述[J].计算机工程与应用,2004,40(32):39-43. 被引量:17
  • 2祝胜林,杨波,张明武.信任管理中证书链发现的研究[J].计算机工程与应用,2007,43(8):111-113. 被引量:2
  • 3Ninghui Li, John C Mitchell. Rt: A role-based trust-management framework[ C ]//Proceedings of the Third DARPA Information Surviv- ability Conference and Exposition, IEEE Computer Society Press, 2003:201 -212.
  • 4Rivest R,Lampson B. SDSI-a simple distributed security infrastructure [OL]. 1996. http://thery, lcs. mit. edu/rivest/sdsill, html.
  • 5Blaze M, Feigenbaum J, Strauss M. Compliance--checking in the Poli- cyMaker trust management system [ C]//Proc of the 2nd Int'l Conf on Financial Cryptography. Berlin : Springer, 1998:54 - 274.
  • 6Ninghui Li, J C Mitchell, W H Winsborough. Design of a Role-based Trust-Management Framework [ C ]//Proc. of the 2002 IEEE Sympo- sium on Security and Privacy, IEEE Computer Society Press, 2002: 114 - 130.
  • 7Ninghui Li, W H Winsborough, J C Mitchell. Distributed Credential Chain Discovery in Trust Management [ C ]//Proc. of the 8th ACM Conference on Computer and Communications Security ( CCS - 8 ), ACM Press, 2001:6 - 165.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部