期刊文献+

基于Petri网的服务网格自动信任协商模型

Automation Trust Negotiation Model Based on the Petri Net
原文传递
导出
摘要 自动信任协商为需要应对各种快速多变需求的服务网格提供了一种新的访问控制方法。给出一种基于Petri网的自动信任协商模型,详述了模型的结构和相关概念,并在此模型基础上提出一种完全的、高效的、避免披露不相关信任证的自动信任协商策略。 Automated trust negotiation establishes trust between strangers through the exchange of digital credentials and the use of access control policies controlled by the negotiation strategy.Based on the architecture of Petri net and automated trust negotiation process,this paper models the policies participating trust negotiation and proposes a trust negotiation by combining the characteristics of the model with the behaviors of auto trust negotiation.
作者 何岩 郑春瑛
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2010年第20期103-107,共5页 Journal of Wuhan University of Technology
关键词 服务网格 自动信任协商 协商策略 PETRI网 service grid automated trust negotiation negotiation strategy petri net
  • 相关文献

参考文献6

  • 1Fosster I, Kesselman C. The Grid 2: Blueprint for a New Computing Infrastructure[ M]. Morgan Kaufmann, 2004.
  • 2孙为群,单保华,张程,刘晨.一种基于角色代理的服务网格虚拟组织访问控制模型[J].计算机学报,2006,29(7):1199-1208. 被引量:16
  • 3Bertino E, Ferrari E, Squicciarini A. Trust Negotiations: Concepts, Systems, and Languages[J ]. IEEE Computing in Science and Engineering, 2004,6 (4) : 27-34.
  • 4李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 5Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, et al. Achieving Privacy in Trust Negotiations with an Ontology-based Approach[ J ]. IEEE Transaction Dependable Section Computer, 2006,3 ( 1 ) : 13-30.
  • 6Song Ye, Makedon F, Ford J. Collaborative Automated Trust Negotiation in Peer-to-peer Systems[C]//Proc of the Fourth International Conf on Peer-to-peer Computing (P2P' 04), 2004 : 108-115.

二级参考文献19

  • 1孙波,赵庆松,孙玉芳.TRDM——具有时限的基于角色的转授权模型[J].计算机研究与发展,2004,41(7):1104-1109. 被引量:26
  • 2Foster I.,Kesselman C.,Tuecke S..The anatomy of the grid.International Journal of High performance Computing Applications,2001,15(3):200~222
  • 3俞坚,韩燕波.面向服务的计算--原理及应用.北京:清华大学出版社,2006
  • 4Han Y.,Geng H.,Li H.et al.VINCA-A visual and personalized business-level composition language for chaining Web-based services.In:Proceedings of the 1st International Conference on Service-Oriented Computing,Trento,Italy,2003,165~177
  • 5Foster I.,Kesselman C.,Pearlman L.,Tuecke S.,Welch V..The community authorization service:Status and future.In:Proceedings of the Computing in High Energy Physics,La Jolla,California,USA,2003
  • 6Alferi R.,Cecchini R.,Ciaschini V.et al.From gridmap-file to VOMS:Managing authorization in a grid environment.Future Generation Computer Systems Journal,2005,21(4):549~558
  • 7Sandhu R.S.,Coyne E.J.,Feinstein H.L.,Youman C.E..Role-based control models.IEEE Computer,1996,29(2):38~47
  • 8David F.Ferraiolo et al.Proposed NIST standard for rolebased access control.ACM Transactions on Information and System Security,2001,4(3):224~274
  • 9Barka E.,Sandhu R..Framework for role-based delegation model.In:Proceedings of the 23rd National Information Systems Security Conference,Baltimore,MD,2000,101~114
  • 10Zhang Long-Hua,Ahn Gail-Joon,Chu Bei-Tseng.A rulebased framework for role-based delegation.In:Proceedings of the 6th ACM Symposium on Access Control Models and Technologies,Chantilly,Virginia,USA,2001,153~162

共引文献66

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部