期刊文献+

分布式环境下行为感知的信任管理 被引量:4

Behavior Aware Trust Management in Distributed Environment
下载PDF
导出
摘要 针对分布式环境下信任管理的不确定性,在基于角色的信任管理基础上,引入行为感知的分析方法,以此作为信任评价的依据。将行为对信任域的影响量化为固定区间内的信任值,通过统计用户群的累积行为,计算出角色声望和域声望,并反馈调整信任域之间的信任委托关系。静态角色和动态行为的结合有效地增强了分布式网络的信任保障能力。 Aiming at the uncertainty of trust management in the distributed environment, this paper introduces behavior aware analytical method into role based trust management for trust evaluation. The impact of behaviors on trust domain is quantized to trust value in a fixed interval. Role and domain reputation are calculated through statistics of cumulative behaviors of user groups, as feedback to adjust trust delegation between domains. The combination of static role and dynamic behavior will effectively enhance security in distributed networks.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第1期139-141,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2008AA01Z409) 国家自然科学基金资助项目(60803145)
关键词 信任管理 行为感知 声望反馈 信任委托 trust management behavior aware reputation feedback trust delegation
  • 相关文献

参考文献4

  • 1Mitchell J C, Winsborough W H. Design of a Role-based Trust Management Framework[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 2002: 114-130.
  • 2Gorla D, Hennessy M, Sassone V. Inferring Dynamic Credentials for Role-based Trust Management[C]//Proc. of the 8th ACM Symposium on Principles and Practice of Declarative Programming. [S. l.]: ACM Press, 2006.
  • 3Selquk A A, Uzun E, Pariente M R. A Reputation-based Trust Management System for P2P Networks[J]. International Journal of Network Security, 2008, 6(2): 227-237.
  • 4单明辉,倪宏,曾学文,贡佳炜,牛尔力.一种融合凭证和声望的信任模型[J].计算机工程,2009,35(8):7-9. 被引量:2

二级参考文献4

  • 1Josang A, Ismail R, Boyd C. A Survey of Trust and Reputation Systems for Online Service Provision[J]. Decision Support Systems, 2007, 43(2): 618-644.
  • 2Josang A, Ismail R. The Beta Reputation System[C]//Proceedings of the 15th Bled Electronic Commerce Conference. Bled, Slovenia: [s. n.], 2002: 17-19.
  • 3Teacy W T, Patel J, Jennings N R, et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources[J]. Autonomous Agents and Multi-agent Systems, 2006, 12(2): 183-198.
  • 4Huynh T D, Jennings N R, Shadbolt N R. FIRE: An Integrated Trust and Reputation Model for Open Multi-agent Systems[C]// Proceedings of the 16th European Conference on Artificial Intelligence. Amsterdam, Hland: lOS Press, 2004.

共引文献1

同被引文献35

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2王东安,张方舟,南凯,阎保平.网格计算中基于信任度的访问控制研究[J].计算机应用研究,2006,23(6):49-51. 被引量:6
  • 3崔伟,汪诗林.分布式系统中数据同步机制的研究与实现[J].计算机工程与设计,2007,28(10):2259-2261. 被引量:16
  • 4Park J, Sandhu S. Towards Usage Control Models: Beyond Tra- ditional Access Control[C] //Proc. of the 7th ACM Symp. on Access Control Models and Technologies. Monterey, USA: [s. n.] , 2002.
  • 5Chakraborty S, Ray I. Trust BAC Integrating Trust Relationships into the RBAC Model for Access Control in Open Systems[C] // Proc. of the 11th ACM Symp. on Access Control Models and Technologies. New York, USA: ACM Press, 2006.
  • 6Sandhu R S. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology[C] //Proc. of the 10th ACM Symp. on Access Control Models and Technologies. Stockholm, Sweden: [s. n.] , 2005.
  • 7Bertino E, Catania B. GEO-RBAC: A Spatially Aware RBAC[C] // Proc. of the 10th ACM Symp. on Access Control Models and Technologies. New York, USA: ACM Press, 2005.
  • 8Januszewski K, Mooney E. UDDI Version 3 Features List[EB/OL]. (2006-05-10). http://uddi.org/pubs/uddi_v3_features.htm.
  • 9Patino-Martínez M, Jimenez-Peris R, Kemme B, et al. MIDDLE-R: Consistent Database Replication at the Middleware Level[J]. ACM Trans. on Computer System, 2005, 23(4): 375-423.
  • 10Cahill V, Gray E, Seigneur J, et al. Using Trust for Secure Collaboration in Uncertain Environments[C] //Proc. of IEEE Pervasive Computing Mobile and Ubiquitous Computing. [S. l.] : IEEE Press, 2003: 52-61.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部