期刊文献+

基于可信敏感度的网格信任协商策略及其应用分析

Trusted Sensitivity Improved Trust Negotiation Strategy and Its Application Analysis for Grid Service
下载PDF
导出
摘要 本文将证书敏感度和实体声誉相结合,提出基于可信敏感度的信任协商策略来避免敏感信息的披露;引入协商第三方来解决循环依赖策略,提高服务成功率.最后分析了策略的计算和通信开销,在NUPT网格平台的测试结果证实了该策略性能令人满意. The paper proposes a masted sensitivity improved negotiation strategy, which is orthogonal to credentials' sensitivity and entity' s reputation. Such modifications help prevent inadvertent disclosure of sensitive information. We also introduce negotiation third parties to solve cyclic dependent policies, which effectively promote the response ratio of grid services request. Its practical performance was validated on NUPT-glid platform, and the results are satisfactory.
出处 《电子学报》 EI CAS CSCD 北大核心 2010年第2期422-426,共5页 Acta Electronica Sinica
基金 国家自然科学基金(No.60573141 No.60773041) 江苏省自然科学基金(No.BK2008451) 国家863高技术研究发展计划(No.2007AA01Z404 No.2007AA01Z478) 现代通信国家重点实验室基金(No.9140C1105040805) 江苏高校科技创新计划(No.CX08B-085Z CX08B-086Z) 江苏省六大高峰人才项目
关键词 网格自动信任协商 协商策略 可信敏感度 协商第三方 grid automated trust negotiation negotiation strategy trusted sensitivity negotiation third party
  • 相关文献

参考文献7

  • 1W H W'msborough, K E Seamons, V E Jones. Automated trust negotiation[ A ]. DARPA Information Survivability Conference and Exposition[ C] .New York: IEEE Press,2000.88 - 102.
  • 2Ting Yu, Ma Xiaosong, M Winslett. PRUNES: An efficient and complete strategy for automated trust negotiation over the internet[ A ]. Prec. of the 7^th ACM conference on Computer and communications security[C]. Athens, Greece. New York: ACM Press, 2000.210 - 219.
  • 3W H Winsborough, Li Ninghui. Protecting sensitive attributes in automated trust negotiation[ A ]. Proc. of the ACM Workshop on Privacy in the Electronic Society Washington[ C] .DC.New York: ACM Press,2002.41 - 51.
  • 4Ting Yu,M Winslett. A unified scheme for resource protection in automated trust negotiation[ A ]. Proc. of IEEE Symposium on Security and Privacy [ C ]. Washington, DC, USA: IEEE Computer Society,2003. 110- 122.
  • 5熊焰,张伟超,苗付友,王行甫.一种基于计算能力的无需可信第三方公平非抵赖信息交换协议[J].电子学报,2006,34(3):563-566. 被引量:4
  • 6姚慧,高承实,戴青,张徐.一种基于动态规划的自动信任协商策略[J].计算机应用,2008,28(4):892-895. 被引量:3
  • 7A C Squicciarini, E Berfino,E Ferrari, et al. PP-Trust-X: A system for privacy preserving trust negotiations[ J]. Acm TissecTransactions on Systems and Information Security, 2007, 10 (3):1-50.

二级参考文献18

  • 1李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 2Steve Kreme,Olivier Markowitch,Jianying zhou.An intensive survey of fair non-repudiation protocols[J].Computer Communications,2002,25 (17):1606-1621.
  • 3T Coffey,P Saidha.Non-repudiation with mandatory proof receipt[J].Computer Communication Review,1996,26(1):6-17.
  • 4N Zhang,Q Shi.Achieving non-repudiation of receipt[J].The Computer Journal,1996,39 (10):844-853.
  • 5J Zhou,D Gollmann.A fair non-repudiation protocol[A].IEEE Symposium on Security and Privacy[C].Oakland,California,USA:IEEE Computer Security Press,1996.55 -61.
  • 6Aokan M Schunter,M Waidner.Optimistic protocols for fair exchange[A].T Matsumoto (Ed.).4thCM Conference on Computer and Communications Security[C].Zurich,Switzerland:ACM Press,1997.8-17.
  • 7S Micali.Certified E-mail with invisible post offices[A].RSA 1997 conference[C].Vancouver,BC,Canada,1997.5-16.
  • 8J Zhou,D Gollmann.An efficient non-repudiation protocol[A].Proceedings of 10th Society Press[C].Silver Spring,MD,1997.126-132.
  • 9J Zhou,R Deng,F Bao.Evolution of fair non-repudiation with TTP[A].ACISP:Information Security and Privacy:Australasian Conference,Lecture Notes in Computer Science[C].Springer,Berlin,1999.258-269.
  • 10T Tedrick.How to exchange half a bit[A].D chaum (Ed.).Advances in Cryptology Proceedings of Crypto 83[C].New York:Plenum Press,1983-1984.147-151.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部