期刊文献+

本体化可信完整性度量策略匹配模型

The Policy Matching Model of Trust Integrity Measuring Based on Ontology
下载PDF
导出
摘要 通过对可信网络接入完整性度量的分析,结合本体的思想,建立了一个基于本体的可信网络完整性度量模型。该模型对终端接入可信网络的完整性参数进行本体化建模,确定对象关联规则,通过基于免疫的本体匹配算法实现了完整性度量策略的自适应选择分发。分析结果表明,该算法能够有效地对完整性度量参数进行策略的优化匹配。 According to the analysis of the integrity measure of trust network connection,An Measuring Model of Trusted Network based on the idea of ontology has been established.The model establishes the ontology model for the terminal integrity parameter of trust network and makes sure of the object relationship rules.It achieves the adaptive choosing and dispensing of integrity measure policy according to the matching arithmetic of ontology based on immunity.The analyzing result shows that the algorithm can efficiently optimize policy matching of the integrity measurement parameters.The presentation of the model has provided a new reaching idea for authorization of policy in trust network.
作者 于璐
出处 《信息安全与技术》 2011年第4期12-14,共3页
关键词 可信网络 完整性度量 本体 免疫理论 trust network integrity measuring ontology immune theory
  • 相关文献

参考文献6

二级参考文献34

  • 1李志民.基于密钥的安全认证系统设计[J].中原工学院学报,2004,15(6):56-58. 被引量:6
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3何召卫,陈俊亮.受限本体相似[J].计算机学报,2006,29(6):858-866. 被引量:9
  • 4[1]Trusted computing group.Trusted platform module main specification Version 1.2[S].2005.
  • 5[2]Sailer R,Zhang X,Jaeger T,et al.Design and implementation of a TCG-based integrity measurement architecture[C]//Proceedings of the 13th Usenix Security Symposium.California:Usenix,2004:223-238.
  • 6[3]biba K J.Integrity considerations for secure computer systems[R].ESD-TR-76-372,Bedford,MA:USAF Electronic Systems Division,Hanscom Air Force Base,1977.
  • 7[4]Oppliger R,Rytz R.Does trusted computing remedy computer security problem[J].Security & Privacy Magazine(IEEE),2005,3(2):16-19.
  • 8[5]Felten E W.Understanding trusted computing:Will its benefits outweigh its drawbacks[J].Security & Privacy Magazine(IEEE),2003,1(3):60-62.
  • 9[6]Iliev A,Smith S W.Protecting client privacy with trusted computing at the server[J].Security & Privacy Magazine(IEEE),2005,3(2):20-28.
  • 10Trusted Computing Group(TCG).TCG Trusted Network Connect TNC Architecture for Interoperability Specification (Version 1.0)[Z].2005-03.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部