期刊文献+

基于动态联盟的一种身份信任计算模型 被引量:2

One of Arithmetic Models of Identity Trust Management Based on Dynamic Federation
下载PDF
导出
摘要 在动态联盟中,身份管理是确保信息安全的一种手段,但是随着联盟成员数日益增多,传统的身份管理难以妥善应对当前较为复杂的环境,尤其当成员之间无交互历史时,数据交换的可靠性无法保障。文中研究了不同计算环境中的多种信任管理方法,并把P2P的推荐评价机制应用到动态联盟的身份管理中,提出了一种基于推荐的身份信任管理的算法。在这种算法中,身份的信任值由多因素加权综合而成,其中推荐信任值在算法中起到关键的作用。该算法试图为解决复杂的动态联盟环境下的身份管理问题提供一种途径。 In the environment of dynamic federation, the identity management is one of the methods for security issues. However, with the increasing of the members, it is more difficult for traditional identity management to deal with the complex situation, especially when members have no communieation records, the security of data switching can not be guaranteed. Focused on some of trust management models, applying the reputation and evaluation mechanism in P2P to dynamic federation, the article brings forward an identity trust algorithm based on reputation. The algorithm, in which trust is weighted by various factors, and reputation rate is a key problem, is expected to offer one method to solve the identity management in the complex dynamic federation.
出处 《计算机技术与发展》 2010年第2期152-155,共4页 Computer Technology and Development
基金 国家863重点基金项目(2005AA113040)
关键词 动态联盟 信任 算法 身份管理 dynamic federation trust arithmetic identity management
  • 相关文献

参考文献7

  • 1Maler E,Reed D. The Venn of Identity-Options and Issues in Federated Identity Management[J ]. IEEE Security & Privacy,2008,6(2) : 17 - 23.
  • 2Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Mamgement[ C]//Proeeedings of the IEEE Conference on Security and Privacy. Oakland,CA: [ s. n. ], 1996.
  • 3Winsborough W, Seamons K. Automated Trust Negotiation [ C]//DARPA Information Survivability Coherence and Exposition. Hilton Head, South Carolina: [s. n. ], 2000.
  • 4Li Xiong, Liu Ling. A Reputation - Based Trust Model for Peer - to- Peer Ecommerce Communities[C]//Proceedings of IEEE Conference of E-Commerce. USA: ACM Press,2003: 275 - 284.
  • 5窦文,王怀民,贾焰,邹鹏.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583. 被引量:325
  • 6Josang A, Fabre J,Hay B, et al. Trust Requirement in Identity Management[ J ]. Australian Computer Society,2005,44: 99 - 108.
  • 7Xue G T, You J Y,Jia Z Q.An Interest Group Model for Content Location in peer- to- peer systems[C]//Proceedings of the IEEE International Conference on E - Commerce Technology for Dynamic E - Business. [s.l. ] : [s. n. ] ,2004.

共引文献324

同被引文献11

  • 1周加法,马涛,李益发.PKI、CPKI、BC性能浅析[J].信息工程大学学报,2005,6(3):26-31. 被引量:23
  • 2李晓峰,冯登国,徐震.基于扩展XACML的策略管理[J].通信学报,2007,28(1):103-110. 被引量:10
  • 3Hafner, M. ,Memon M. , et al. SeAAS-A Reference Architec- ture for Security Services in SOA [J]. Journal of Universal Computer Science, 2009, 15(15): 2916-2936.
  • 4Cotroneo, D. , Graziano A. , et al. Security Requirements in Service Oriented Architectures for Ubiquitous Computing[C]. 2nd Workshop On Middleware for Pervasive and Ad-Hoc Com- puting, Toronto, Canada, ACM, 2004: 172-177.
  • 5Yamany, H. F. E. Capretz M. A. M. , et al. Intelligent Se- curity and Access Control Framework for Service-oriented Ar- chitecture[J]. Information and Software Technology, 2010, 52 (1) : 220-236.
  • 6Rosado, D. G. , Femfindz-Medina. , et al. Security Services Architecture for Secure Mobile Grid Systems[J]. Journal of Systems Architecture, 2011, 57(3): 240-258.
  • 7Colombo, M., Martinelli F. et ak Fine Grained Access Control with Trust and Reputation Management for Gtobus[C]. OTM2007, Part II, LNCS 4804, Springer Berlin/Heidelberg, 2007: 1505-1515.
  • 8杨宏宇,孙宇超,姜德全.基于SAML和PMI的授权管理模型[J].吉林大学学报(工学版),2009,39(5):1321-1325. 被引量:3
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 10何荣茂,秦富童,胡然,于鑫.基于SOA的异构数据集成中间件的研究与设计[J].舰船电子工程,2012,32(1):77-78. 被引量:8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部