期刊文献+

网络安全中多维信任模型的研究 被引量:3

Research on Multi-Trust Model in Network Security
下载PDF
导出
摘要 针对网络安全问题,国内外研究人员试图从信任的角度来解决和加强网络安全并且提出了许多信任模型,但并没有形成一致的观点。本文结合信任特性和网络安全的特点,提出了一种基于D-S证据理论的多维信任模型,给出了网络中多维信任的概念并提出了多维信任的计算方法和合并规则。实验表明,该信任模型能够合理地有效地遏制恶意实体的行为,降低网络中不安全因素对整个网络的影响。 About the network security problem, domestic and foreign researchers have tried to solve it from the perspective of trust to enhance network security and a lot of trust models have been proposed in the literature. However, a universally agreed trust model has not been seen yet. Combining features of trust and network security, a DST-Based Multi-dimensional Trust Model is proposed, the multi-dimensional trust conception is introduced, multi-dimensional trust computing method and trust combination rules are given. Simulation studies show that the model is able to restrain the malicious entities ’ actions more effectively, and reduce the influence of unsafe factors of the entire network.
出处 《微计算机信息》 2010年第33期51-53,35,共4页 Control & Automation
基金 基金申请人:王国军 项目名称:可信网络计算环境中的融合信任模型及信任传递机制研究 基金颁发部门:国家自然科学基金委(90718034) 基金申请人:施荣华 王国军 项目名称:移动自组网中移动敌手及欺骗问题的研究 基金颁发部门:国家自然科学基金委(60773013)
关键词 网络安全 信任模型 证据 多维信任 Network security trust model evidence multi-dimensional trust
  • 相关文献

参考文献3

二级参考文献25

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3I.Foster,C.Kesselman,and S.Tuecke. The Anatomy of the Grid :Enabling Scabling Virtual Organizations [J]. Int′ l J.Supercomputer Applications,2001 ,vol. 15 ,no. 3.
  • 4L. Pearlman and colleagues. A Community Authorization Service for Group Collaboration[J].Proc. IEEE CS Press, 2002, pp.50-60.
  • 5Lavanya Ramakrishnan. Grid computing-Securing next-generation grids[J].IT Professional, 2004,Volume(6),Issue(2):34-39.
  • 6肖侬.课程讲义:《网格安全技术》[EB/OL].http://www.chinagrid.net/,2004.
  • 7.公钥安全体系简介[EB/L].http://www.cdpmh.com/SSL/SSL-1.htm,2002.
  • 8.[EB/OL].http://www -900.ibm.com/developerWorks/cn/grid/gr -security/index.shtml,2003,12.
  • 9Foster I, Kesselman C, Tuecke S. The Anatomy of the Grid: Enabling Scalable Virtual Organizations[J].International Journal of Supercomputer Application, 2001,15(3) : 200-222.
  • 10Algridas A, Laprie J C, Randell B, et al. Basic Concepts and Taxonomy of Dependable and Secure Computing[J]. IEEE Transactions on Dependable and Secure Computing, 2004,1 (1) : 11-33.

共引文献72

同被引文献18

  • 1M. Theoharidou, S. Kokolakis, M. Karyda, et al., The insider threat to information systems and the effectiveness of ISO17799 [J], Computers and Security, vol. 24(6), pp. 472-484, 2005.
  • 2Information security management systems - Specification with guidance for use [S], BSI, 2002.
  • 3D. Trcek, An integral framework for information systems security management [J], Computers & Security, vol. 22 (4), pp. 337-360, 2003.
  • 4J. Rees, S. Bandyopadhyay,E. H. Spafford, PFIRES: A Policy Framework for Information Security [J], Communications of the ACM vol. 46 (7), pp. 101-106, 2003.
  • 5S. H. Vonsolms, Corporate Governance and Information Security [J], Computers and Security, vol. 20(3), 2001.
  • 6KING II REPORT ON CORPORATE GOVERNANCE., [EB/ OL], http://iodsa.co.za/lod%20Draft%20King%20Report.pdf, 2000.
  • 7T. Patterson, Holistic Security:Why Doing More Can Cost You Less and Lower Your Risk [J], Computer Fraud & Security, vol. 2003(6), pp. 13-15, 2003.
  • 8J. H. P. Eloff, M. M. Eloff, Information security architecture [J], Computer Fraud & Security, pp. 10-16, 2005.
  • 9ISO/IEC_JTC1/SC27, Information technology - Security tech- niques - Evaluation criteria for IT security [S], ISO/IEC 15408: 2005 (Common Criteria v3.0) 2005.
  • 10C. B. Haley, R. Laney, J. D. Moffett, and B. Nuseibeh, Security Requirements Engineering: A Framework for Representation and Analysis [J]. IEEE TRANSACTIONS ON SOFTWARE ENGI- NEERING, vol. 34, pp. 133-153, 2008.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部