期刊文献+

基于信任度的分布式证书链搜索算法

Distributed Certificates Searching Algorithm Based on Trustworthiness
下载PDF
导出
摘要 为解决信任管理中分布式证书链的搜索问题,定义了成员集与权限集的概念,并在此基础上提出了基于信任度的分布式证书链前向、后向和双向搜索算法,分析了算法复杂度,与现有算法进行了比较,并以一个实例说明了算法的应用,结合算法的预处理等功能证明:算法具有一定的实用性和高效性. This paper addresses the distributed certificates searching problem in trust management. The member set and privilege set are defined, and the forward, backward and bidirectional distributed certificates searching algorithms based on the definitions are proposed. The complexity of the algorithms is analyzed compared with the existing algorithms, and the application of the algorithms is described with an instance. The results suggest that the algorithm has high practicability and efficiency with the preprocess functions.
出处 《中南民族大学学报(自然科学版)》 CAS 2011年第4期86-89,共4页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 武汉市青年科技晨光计划资助项目(201150431076)
关键词 访问控制 信任管理 信任度 证书搜索 access control trust management trustworthiness certificate searching
  • 相关文献

参考文献7

  • 1Li N, Winsborough W H, Mitchell J C. Distributed credential chain discovery in trust management [ J ]. Journal of Computer Security, 2003, 11 ( 1 ) : 35-86.
  • 2Zhu X, Wang S, Hong F, et al. Distributed credential chain discovery in trust-management with parameterized toles [ C ]// Desmedt Y G. Proceedings of the 4th International Conference on Cryptology and Network Security ( CANS05 ) LNCS 3810. Xiamen: SpringerVerlag, 2005: 334-348.
  • 3廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 4LEI Jianyun,CUI Guohua,XING Guanglin.Trust Calculation and Delivery Control in Trust-Based Access Control[J].Wuhan University Journal of Natural Sciences,2008,13(6):765-768. 被引量:2
  • 5Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust-management framework [ C ]//IEEE. Proceeding of the 2002 IEEE Symposium on Security and Privacy, Claremont Resort Oakland. California: IEEE, 2002: 114-130.
  • 6Freudenthal E, Pesin T, Port L, et al. dRBAC: distributed role-based access control for dynamic coalition environments. [ C ]//ICDCS. Proceedings of the 22nd International Conference on Distributed Computing Systems ( ICDCSCY2), Vienna : ICDCS, 2002:411-434.
  • 7雷建云,崔国华,章丽平,邢光林.可计算的基于信任的授权委托模型[J].计算机科学,2008,35(10):73-75. 被引量:7

二级参考文献24

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2Blaze M, Feigenbaum J, Lacy J. Decentralized trust management //Proceedings of the 1996 IEEE Symposium on Security and Privacy. Washington, DC, USA, 1996 : 164-173
  • 3Chakraborty S, Ray I. TrustBAC - Integrating Trust Relation - ships into the RBAC Model for Access Control in Open Systems //SACMAT'06. Lake Tahoe, California, USA, 2006 :49-58
  • 4Hong Fan, Zhu Xian, Wang Shaobin. Delegation Depth Control in Trust-management SystemffProeeedings of the 19th International Conference on Advanced Information Networking and Applications. 2005 : 1-4
  • 5Chu Yang-Hua, Feigenbaum J, et al. REFEREE: Trust management for Web applications. World Wide Web Journal, 1997,2 (3):127-139
  • 6Li Ning-Hui,Mitchell J C,Winsborough W H. Design of a rolebased trust-management framework // Proeeedings of the 2002 IEEE Symposium on Security and Privacy. Oakland,CA, USA, 2002:114-130
  • 7Bertino E, Ferrara E, Squicciarini A C. Trust-X: A Peer to Peer framework for trust negotiations. IEEE Transactions on Knowledge and Data Engineering, 2004,16(7) : 827-842
  • 8Freudenthal E, Pesin T,Port L, et al. dRBAC:Distributed role-based access control for dynamic coalition environments ff Proceedings of the 22^nd International Conference on Distributed Computing Syste,s (ICDCS' 02). Vienna, Austria, 2002 : 411-434
  • 9Clarke D. , Elien J. E. , Ellison C. et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 10Li N. , Winsborough W. H. , Mitchell J. C.. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35-86

共引文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部