期刊文献+

计算网格中一种扩展的SPKI/SDSI模型

SPKI/SDSI extension model in computational grid
下载PDF
导出
摘要 SPKI/SDSI是一种灵活且可扩展的分散的安全模型,它能够提供认证、保密和访问控制。然而,SPKI/SDSI证书链并不适合大规模、高动态的环境,比如计算网格。通过观念模型基于主观逻辑对SPKI/SDSI安全模型进行了扩展,提出了一种扩展的SPKI/SDSI模型。该扩展模型可以灵活应用于计算网格。 SPKI/SDSI is a flexible and extensible decentralized security model that provides authentication,confidentiality, and access control.However,SPKI/SDSI certification chains are not suitable for large scale,highly dynamic environments such as computational grids.This paper extends the SPKI/SDSI model by including an opinion model based on subjective logic.The model can be flexibly applied to computational grid.
出处 《计算机工程与应用》 CSCD 北大核心 2010年第19期88-90,共3页 Computer Engineering and Applications
关键词 计算网格 SPKI/SDSI模型 主观逻辑 观念证书 computational grid Simple Public Key Infrastructure/Simple Distributed Security Infrastructure(SPKI/SDSI) model subjective logic opinion certificate
  • 相关文献

参考文献9

  • 1Foster I,Kesselman C.The Grid 2:Blueprint for a new computing infrastructure[M].[S.l] :Morgan Kaufmann Publishers Inc.,2003.
  • 2Litzkow M,Livny M,Mutka M.Condor:A hunter of idle workstations[C] //Proceedings of the 8thInternational Conference of Distributed Computing SystemsPalo Alto,CA,1988.
  • 3Ellison C,Frantz B,Lampson B.SPKI certificate theory[M].Internet RFC,1999.
  • 4陈飞舟,王茜,朱庆生.SPKI证书结构及其应用[J].重庆大学学报(自然科学版),2004,27(7):86-89. 被引量:5
  • 5Santin A,da Silva Fraga J,de Mello E R,et al.Extending the SDSI/SPKI model through federation Webs[C] //Communications and Multimedia Security Turim,Iraly,2003.
  • 6Howell J,Kom D.A formal semantics for SPKI[C] //ESORICS'00:Proceedings of the 6th European Symposium on Research in Computer Security London,UK,2000.
  • 7Li N.Local names in SPKd/SDSI[C] //Proeeedings of the 13th IEEE Computer Security Foundatiom Workshop,Washington,DC,USA,2000.
  • 8J(o)sang A.Artificial reasoning with subjective logic[C] //Sccond Australian Workshop on Commonsense Reasoning Perth,Australia,1997.
  • 9耿秀华,韩臻,金砺,何永忠.一种基于约束的SPKI/SDSI2.0一致性验证机制[J].北京交通大学学报,2008,32(2):1-5. 被引量:2

二级参考文献14

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2RIVEST RONALD, LAMPSOM BUTLER .SDSI-A Simple Distributed Security Infrastructure[EB/OL].http://research.microsoft.com/lampson/59-SDSI/WebPage.html,1996.
  • 3RFC 2692, SPKI Requirements[S].
  • 4WANG YULIAN. SPKI[EB/OL].http://www.hut.fi/-yuwang/publications/SPKI/SPKI.html,1999.
  • 5RFC 2693, SPKI Certificate Theory[S].
  • 6HEIKKIL JUHO, LAUKKA MARKKU.SPKI Based Solution to Anonymous Payment and Transaction Authorization[EB/OL].http://www.tml.hut.fi/Research/TeSSA/Papers/Heikkila-Laukka/nordsec99-heikkila-laukka.pdf,1999.
  • 7Ninghui Li, John C Mitchell, William H Winsborough. Beyond Proof of Compliance: Security Analysis in Trust Management[J]. Journal of ACM, 2005,52(3) : 474 - 514.
  • 8Sandro Etalle, William H Winsborough. Integrity Constraint in Trust Management [ C ].SACMAT' 05, Stockholm, Sweden: 2005 : 1 - 3.
  • 9Ronald L Rivest, Bulter Lampson. Cryptography and Information Security Group Research Project- A Simple Distributed Security Infrastructure[ EB/OL]. (1996)[ 2007]. http:////theory, lcs. mit. edu/- cis/sdsi, html.
  • 10Clarke D, Ellen J, Ellison C. Certificate Chain Discovery in SPKI/SDSI[J]. Journal of Computer Security, 2002,9 (4) :285 - 322.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部