期刊文献+

一种带有时间域的证书链搜索算法

A TIME DOMAIN-BASED CREDENTIAL CHAIN DISCOVERY ALGORITHM
下载PDF
导出
摘要 针对当前基于角色的信任管理语言RT0的不足,提出带有时间域的信任管理语言,在证书的结构中增加了证书的有效期和证书的版本号,并对交集表达式的长度进行了限制。实验表明,带有时间域的信任管理语言使证书链搜索过程变得更加迅速、有效。 A trust management language with time domain is presented aiming at the deficiency of the early-proposed role-based trust management language RT0.Validity term and version number are combined with the structure of certificate and a restriction on length of the intersection expression is proposed.Experiment shows that the trust management language with time domain makes the progress of credential chain discovery become more prompt and efficient.
出处 《计算机应用与软件》 CSCD 2011年第9期281-282,300,共3页 Computer Applications and Software
关键词 信任 证书链搜索 时间域 Trust Credential chain discovery Time domain
  • 相关文献

参考文献8

  • 1Ninghui Li, John C Mitchell. Rt: A role-based trust-management framework[ C ]//Proceedings of the Third DARPA Information Surviv- ability Conference and Exposition, IEEE Computer Society Press, 2003:201 -212.
  • 2刘鹏,刘欣,陈钟.信任管理研究综述[J].计算机工程与应用,2004,40(32):39-43. 被引量:17
  • 3Rivest R,Lampson B. SDSI-a simple distributed security infrastructure [OL]. 1996. http://thery, lcs. mit. edu/rivest/sdsill, html.
  • 4Blaze M, Feigenbaum J, Strauss M. Compliance--checking in the Poli- cyMaker trust management system [ C]//Proc of the 2nd Int'l Conf on Financial Cryptography. Berlin : Springer, 1998:54 - 274.
  • 5Ninghui Li, J C Mitchell, W H Winsborough. Design of a Role-based Trust-Management Framework [ C ]//Proc. of the 2002 IEEE Sympo- sium on Security and Privacy, IEEE Computer Society Press, 2002: 114 - 130.
  • 6祝胜林,杨波,张明武.信任管理中证书链发现的研究[J].计算机工程与应用,2007,43(8):111-113. 被引量:2
  • 7Ninghui Li, W H Winsborough, J C Mitchell. Distributed Credential Chain Discovery in Trust Management [ C ]//Proc. of the 8th ACM Conference on Computer and Communications Security ( CCS - 8 ), ACM Press, 2001:6 - 165.
  • 8郝晓晓,张卫丰.一种基于时间域和信任度的分布式证书链搜索算法[J].计算机系统应用,2010,19(2):139-142. 被引量:1

二级参考文献44

  • 1刘鹏,刘欣,陈钟.信任管理研究综述[J].计算机工程与应用,2004,40(32):39-43. 被引量:17
  • 2程男男,杨波.一种带有信任度的基于角色的信任管理模型[J].计算机应用研究,2006,23(1):100-102. 被引量:1
  • 3高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20
  • 4廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 5祝胜林,杨波,张明武.信任管理中证书链发现的研究[J].计算机工程与应用,2007,43(8):111-113. 被引量:2
  • 6Li NH, Winsborough WH, Mitchell JC. Distributed credential chain discovery in trust management (full version). New York: ACM Press, 2001.156- 165.
  • 7Li NH, Winsborough WH, Mitchell JC. Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, 2003, 11(1):35 - 86.
  • 8Zhu X, Wang S, Hong F, et al. Distributed credential chain discovery in trust-management with parameterizeed roles. Chinese Journal of Computers, 2006,29 (8):1266 - 1270.
  • 9Blaze M ,Feigenbaum J ,Ioannidis J et al.The role of trust management in distributed systems security. In Secure Internet Programming:Issues for Mobile and Distributed Objects,Berlin:Springer-Verlag,1999:185~210
  • 10Blaze M,Feigenbaum Jand Lacy J.Decentralized trust management[C].In:Proceedings of the 17th Symposium on Security and Privacy,IEEE Computer Society Press, 1996:164~173

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部