期刊文献+

网构软件信任机制的形式化研究 被引量:2

Study on formalization of trust mechanism for Internetware
下载PDF
导出
摘要 Internet环境下构件群体间信任关系的形式化建模是实现其仿真的关键环节,给出了信念逻辑及信任关系的形式化定义,包括形式化描述、分析、逻辑推理及证明过程,以及信任链建立和传递过程中成立的语义解释和约束条件,并结合PKI模型实例对信任链的建立过程进行了形式化描述与推演.提出了一种可行的最优化信任链搜索算法(GSTC)和多路径信任聚合算法(MPTA).通过仿真实验对比了GSTC算法和RSTC算法、以及MPTA算法在受限和非受限条件下的性能.网构软件信任逻辑形式化方法的建立,揭示了构件间信任逻辑的建立和推理过程,不仅能够满足构件信任方面服务质量的需求,有效的提高整个网络的信任水平;而且有助于解决真实环境下构件实体间存在的安全问题,为构件集群环境下安全控制及信任系统形式化研究提供了有价值的新思路. The formal modeling of the trust relationship between Internetware systems is a crucial link in the realization of its simulation.In this paper the formal definition of belief logic and trust relationship was presented,including formal specification,logical reasoning,and the analyzing and proving processes.The semantic interpretation and constraints during the establishment and transmission process of the trust chain were given.Combined with a PKI model and instances,the formalization description and deduction of the trust chain's establishing process were demonstrated.In particular,an optimum and feasible trust chain's searching algorithm was put forward-greedy strategy for trust chain(GSTC)-along with a multiple path trust aggregation algorithm-multiple path trust aggregation(MPTA).Through experimental analysis the capability of the GSTC and RSTC algorithms was compared.Furthermore,the performance of MPTA algorithm under restrained and non-restrained conditions was compared.With the build-up of the formalization approach for Internetware trust logic,the establishing and reasoning process of trust logic between Internetware components was revealed.It not only satisfied the requirements of quality of service on the Internetware's trust mechanism and effectively enhanced the trust level of the entire network,but assisted in solving the secure problems existing in component entities under real environments,and provided a valuable new thread for studying secure component control under a cluster environment and formalization of trust systems.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2011年第6期800-806,共7页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(60973075) 黑龙江省自然科学基金资助项目(F200937) 哈尔滨市科技局基金资助项目(RC2009XK010003) 哈尔滨工程大学基本科研业务费专项基金资助项目(HEUCF100605)
关键词 网构软件 信念逻辑 信任关系形式化 信任链搜索 多路径信任聚合 Internetware belief logic formalization of trust relationship trust chain searching multiple path trust aggregation
  • 相关文献

参考文献10

  • 1杨芙清.软件工程技术发展思索[J].软件学报,2005,16(1):1-7. 被引量:267
  • 2袁禄来,曾国荪,王伟.基于Pi-演算的信任网络形式化建模[J].系统仿真学报,2008,20(1):57-61. 被引量:2
  • 3LAMPSON B,ABADI M, BURROWS M,WOBBERE. Authen- tication in distributed systems: theory and practice [ J ]. ACM Transactions on Computer Systems, 1992,10 (4) :265-310.
  • 4BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management [ C ]//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, 1996:164-173.
  • 5LI N, MITCHELL J C, WINSBOROUGH W H. Design of a role-based trust management framework [ C ]//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Berkeley, 2002 : 114-130.
  • 6MOSES T. Trust management in the public key infrastructure [ EB/OL ]. [ 2002-06-03 ]. http://www, entrust, corn/resources/pdf/trustmodels, pdf.
  • 7GRANDISON T, SLOMAN M. A survey of trust inInternet applications [ J ]. IEEE Communications Surveys, 2000,4 (4) :2-16.
  • 8JOSANG A. The right type of trust for distributed systems [ C]//Proceedings of the 1996 Workshop on New security Paradigms. San Diego, USA, 1996 : 119-131.
  • 9SIPSER M. Introduction to the theory of computation [ M ]. Boston: PWS Publishing Company,2008 : 136-145.
  • 10FOMIN F V, GRANDONI F. A measure & conquer ap- proach for the analysis of exact algorithms [ J ]. Journal of the ACM, 2009:56(5) :25-27.

二级参考文献15

  • 1袁巍,李津生,洪佩琳.一种P2P网络分布式信任模型及仿真[J].系统仿真学报,2006,18(4):938-942. 被引量:45
  • 2孟祥怡,张光卫,刘常昱,康建初,李鹤松.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317. 被引量:36
  • 3杨芙清 见:杨芙清 何新贵主编.青鸟工程现状与发展—兼论我国软件产业发展途径[A].见:杨芙清,何新贵主编.第6次全国软件工程学术会议论文集:软件工程进展—技术、方法和实践[C].北京:清华大学出版社,1996..
  • 4Foster I,Kesselman C.The Grid 2:Blueprint for a New Computing Infrastructure[M].San Francisco:Morgan Kaufmann Publisher,2004.
  • 5Caronni G.Walking the Web of Trust[C]// Proceedings of the 9th Workshop on Enabling Technologies (WET ICE'2000).Los Alomitos,CA:IEEE Computer Society Press,2000.
  • 6Victor B,Moller F.The Mobility Workbench:A Tool for the π-Calculus[C]// Proceedings of the 6th International Conference on Computer-Aided Verification.Berlin,Heidelberg:Springer-Verlag,1994:428-440.
  • 7Milner R.Communicating and Mobile Systems:The Pi-Calculus[M].Cambridge:Cambridge University Press,May 1999.
  • 8Agudo I,Lopez J,Montenegro J A.A representation model of trust relationships with delegation extensions[C]// Proceedings of the 3rd international conference on trust management.Berlin,Heidelberg:Springer-Verlag,2005:116-130.
  • 9Ruan C,Varadharajan V,and Zhang Y.Logic-based reasoning on delegatable authorizations[C]// Proceedings of the 13th International Symposium on Methodologies for Intelligent Systems.Berlin,Heidelberg:Springer-Verlag,2002:185-193.
  • 10Lodderstedt T,Basin D,Doser J.Secure UML:a UML-based modeling language for model-driven security[C]// Proceedings of the 5th International Conference on The Unified Modeling Language.Berlin,Heidelberg:Springer-Verlag,2002:426-441.

共引文献267

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部