期刊文献+

基于使用控制模型的P2P网动态访问控制策略研究 被引量:1

Research on dynamic access control policy based on usage control in P2P networks virtual prototype technology of product
下载PDF
导出
摘要 P2P系统的匿名性和动态性给其安全性和可靠性带来了挑战.并在很大程度上限制了P2P的大规模商业应用.本文提出了一种P2P环境下基于使用控制的动态访问控制模型PUCON,该模型改进了传统的访问控制模型不能很好地适应P2P网络环境的不足.该模型由认证、控制和更新三大模块组成,以访问监控器为执行部件,以混合方式管理属性,达到了持续性控制和属性动态更新目的.通过仿真实验,验证了本模型的安全性和有效性. The anonymity and dynamics of the P2P network bring many security prob- lems to security and dependability of services offered by it, which seriously limit the large scale commercial applications of P2P. The traditional access control models and trust management models can not satisfy the P2P environment commendably. This paper proposes a dynamic access control model PUCON which based on usage control for P2P environment. In this model, access control policies are composed by authenticate, control, and update module, the reference monitor is used as enforcement component, attribute managed by mix types, then the decision continuity and attribute mutability are practical. Finally, a examination system is implemented to prove the security and feasibility of the proposed model.
出处 《华中师范大学学报(自然科学版)》 CAS CSCD 北大核心 2011年第1期31-36,42,共7页 Journal of Central China Normal University:Natural Sciences
基金 江苏省高校自然科学基金资助(10KJD480003)
关键词 对等网络 访问控制 使用控制 peer to peer network access control usage control
  • 相关文献

参考文献15

  • 1Aberer K,Despotovic Z.Managing trust in a peer-to-peer information system[J].Pro of ACM International Conference on Information and Knowledge Management,2001(2):2-12.
  • 2Kamvar S.EigenRep:Reputation management in P2P networks[R].Stanford University:Technical Report,SCCM202216,2002.
  • 3Kamvar S D,Schlosser M T.EigenRep:Reputation management in P2P networks[J].Pro of the 12th World Wide Web Conference on Budapest,2003(6):123-134.
  • 4Wang Y,Vassileva J.Bayesian network-based trust model[J].Proc of IEEE/ WIC International Conference on Web Intelligence Halifax Canda,2003(3):372-378.
  • 5Wang Y,Vassileva J.Trust and reputation model in peer-to-peer networks[J].Proc of the 3rd Int'l Conference on Peer-to-Peer Computing,2003(3):150-157.
  • 6Ansi.American national standard for information technology-role based access control[S].2004:359.
  • 7文珠穆,卢正鼎,唐卓,辜希武.基于RBAC的P2P网络环境信任模型研究[J].计算机科学,2008,35(6):32-36. 被引量:5
  • 8Zhang X,Parisi-Presicce F,Sandhu R,et al.Formal model and policy specification of usage control[J].ACM Transactions on Information and Systems Security,2005,8(4):351-387.
  • 9Park J,Sandhu R.The UCONABC Usage Control Model[J].ACM Trans on Information and System Security,2004,7(1):128-174.
  • 10Xu M,Jiang X,Sandhu R,et al.Towards a VMM-based usage control famework for OS kernel integrity protection[J].ACM Symp on Access Control Models and Technologies,2007(4):20-22.

二级参考文献14

  • 1Aberer K,Despotovic Z. Managing Trust in a Peer-To-Peer Information SystemffProc. of ACM International Conference on Information and Knowledge Management (CIKM). 2001
  • 2Kamvar S, Schlosser M, Garcia-Molina H. The Eigentrust Algorithm for Reputation Management in P2P Networks ff Proc. of the Twelfth International World Wide Web Conference. Bu dapest, 2003
  • 3McKnight D H,Chervany N L. The Meanings of Trust. Technical Report WP9604. University of Minnesota Management Information Systems Research Center, 1996
  • 4Selcuk A, Uzun E, Pariente M. A Reputation-Based Trust Management System for P2P Networks// 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID). 2004
  • 5Ratnasamy S. Routing algorithms for DHTs: Some open questions//Kaashoek F, ed. Proc. of the 1st Int' 1 Workshop on Peer-to-Peer Systems. Cambridge: Springer-Verlag, 2002: 45- 52
  • 6Wang Yan, Lin Fu-ren. Trust and Risk Evaluation of Transac tions with Different Amounts in Peer-to-Peer E-commerce Environments// IEEE International Conference on e-Business Engineering (ICEBE'06). IEEE, 2006:102-109
  • 7Kamvar S. EigenRep.- Reputation Management in P2P Networks. Technical Report, SCCM-02-16. Stanford University, 2002
  • 8Kamvar S D, Schlosser M T. EigenRep: Reputation management in P2P networks// Lawrence S, ed. Proc. of the 12th Int'l World Wide Web Conf. Budapest: ACM Press, 123-134
  • 9Bianchini M,Gori M,Scarselli F. PageRank and Web communities,Web Intelligence, 2003. WI 2003// Proceedings. IEEE/ WIC International Conference on. Oct. 2003:365- 371
  • 10Liu Jun, Li Zhe, Lin Dan, et al. A security enhanced AODV routing protocol based on the credence mechanism. Wireless Communications, Networking and Mobile Computing, 2005// Proceedings. 2005 International Conference on. Volume 2, Sept. 2005:719-722

共引文献4

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部