期刊文献+

基于“软件人”的网络信任管理研究 被引量:1

Research on Network Trust Management Based on "Softman"
下载PDF
导出
摘要 信任管理从网络环境安全和信任的真实需求出发,收集、分析、处理网络环境中的信任信息,并通过一些策略和方法,建立规则、模型、评估标识信任度、提出管理策略。软件人模型技术将有助于突破网络信任管理关键技术环节。本文分析了信任的概念及其相关联因素,对网络环境中信任以及信任关系进行研究。给出了网络信任管理的模型和信任度量方法,提出了基于软件人的网络信任管理架构。 The trust management,embarking from the real requirement of network environmental security and trust,collect,analysis and process trust information of network environment trust information.The rule,model has been established,the trust level has been evaluated and identified,the management strategy has been proposed.The "Softman" model and technology is helpful to break through key technologies link of network trust management.The conception and relevant factors of network trust information have been analyzed,the trust relationship of network environment has been studied,the network trust management model and the measured method of trust are given,and the trust management framework based on "Softman" is proposed in this paper.
出处 《微计算机信息》 2010年第30期24-26,共3页 Control & Automation
基金 基金申请人:王枞 项目名称:IP信任管理的理论体系研究 基金颁发部门:国家973基础研究项目(2007CB310701) 北京市自然科学基金(4092029)
关键词 信任 信任管理 软件人 网络通信 信息安全 Trust Trust management Softman Network Communication Information Security
  • 相关文献

参考文献2

二级参考文献24

  • 1曾广平 涂序彦.软件人《中国人工智能进展2003年》[M].广州:北京邮电大学出版社,2003..
  • 2A. S. Rao; "AgentSpeak (L): BDI agents speak out in a logical computable language"; Lecture Notes in Computer Science, 1038:42-55,1996.
  • 3F.Bellifemine, A.Poggi, and G.Rimassa; "JADE -A FIPA Compliant Agent Framework"; In Proceddings of the 4th International Conference on the Practical Applications of Agent and Multi-Agent Systems (PAAM99),Pages 97-108,1999.
  • 4Tu Xuyan; "Generalized Artificial Life Race and Model" ;proceedings of the 8-th AROB, 2003, Japan.
  • 5Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 6Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 7Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 8Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 9Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 10Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.

共引文献119

同被引文献2

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部