期刊文献+

一个基于普适计算的动态协同的信任模型

Dynamic Collaborative Trust Model Based on Pervasive Computing
下载PDF
导出
摘要 普适计算环境是一个具有高度动态性的分布式环境,进行信息交互的实体之间存在着自发性和不可预知性。因此,普适计算比传统计算更强调信任的作用,对系统安全也提出了更高的要求。综合了影响信任决策的多个凭证因素,并结合信息安全风险评估,提出一个由信任-信誉模块和风险模块组成的动态协同模型。该模型克服了对影响信任决策的凭证考虑不完整的问题,有利于在实体间建立可靠的信任关系,提高普适环境和信息的安全性。 Pervasive computing environment is a highly dynamic distributed environment in which principals collaborate spontaneously and unpredictably.Therefore,the pervasive computing puts more emphasis on the role of trust and puts forward higher request to system security than traditional calculation.A new dynamic collaborative trust model composed trust-reputation module and risk module was proposed based on combining credence elements and information safety risk assessment.This model resolve the limitations in the integrality of evidence used for the trust judgment,and in favor of setting up the reliable trust relationship in the entities,and improving environment and information security of universal.
作者 惠晓威 邹璐
出处 《计算机系统应用》 2010年第11期71-74,共4页 Computer Systems & Applications
基金 辽宁省教育厅基金项目(基于SDR的智能天线基站信道分配优化算法研究)(2004D028)
关键词 普适计算 动态 协同 信任模型 pervasive computing dynamic collaborative trust model
  • 相关文献

参考文献7

二级参考文献52

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:307
  • 2刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:184
  • 3刘常昱,李德毅,杜鹢,韩旭.正态云模型的统计分析[J].信息与控制,2005,34(2):236-239. 被引量:208
  • 4ISO/IEC 17799.International Organization for Standardization,Code of Practice for Information Security Management[S].2000.
  • 5ISO/IEC 15408.The International Organization for Standardization, Common Criteria for Information Technology Security Evaluation[S]. 1999(E).
  • 6Jonathan Tregear.Risk Assessment[J].Information Security Technical Report,2001;6(3):19~21.
  • 7Summers R C.Secure Computing:threats & safeguards[M].McGraw-Hill, 1977.
  • 8Carroll J M.Computer Security[M].Butterworth-Heinemann, 1996.
  • 9Pfleeger C P.Security in Computing[M].Prentice Hall Int, 1997.
  • 10L Labuschagne,JHP Eloff.The use of Real-time Risk Analysis to enable dynamic activation of countermeasures[J].Computers & Security, 1998;17(4) :347-357.

共引文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部