期刊文献+

基于面向对象信任攻击图的信任风险传播模型 被引量:1

Trust Risk Propagating Model Based on Object-oriented Trust Attack Graph
下载PDF
导出
摘要 针对信任环境系统中存在的信任攻击问题,设计基于面向对象的信任攻击图模型。利用Take规则、Grant规则和Pervade规则,描述信任主体对象属性弱点导致的信任级别的提升、信任关系的传递、渗透与扩散问题,使攻击可达距离更大。根据弱点利用规则和信任关系盗用规则,提出多项式时间复杂度信任关系传递闭包生成算法及基于信任关系传递闭包的信任风险传播算法。实验结果证明了该模型的正确性。 In order to study the trust attack problem in complicated trust environment, the object-oriented trust attack graph model is put forward. In the model, the rule take, grant and pervade are used to describe trust level escalating, trust relation transiting, pervading and spreading resulting from utilization of vulnerabilities existing in attributes of trust entity objects, therefore a longer attack reachable distance can be reached. The model carries the attack complexity and harmfulness index which are used to determine the attack threat index, the vulnerability utilizing rules and trust relation embezzling rules are used to establish the trust relation transitive closure generating algorithm with polynomial time complexity, based on which a trust risk propagating algorithm is established. Through an experiment based on modeling real vulnerabilities for a system, the model is proofed to be correct.
出处 《计算机工程》 CAS CSCD 2012年第4期129-133,共5页 Computer Engineering
基金 西安建筑科技大学人才科技基金资助项目(RC1019) 陕西省重点学科建设专项基金资助项目(zdxk2010)
关键词 信任 风险传播模型 信任攻击 信任关系网络 信任关系盗用 trust risk propagating model trust attack trust relation network trust relation embezzling
  • 相关文献

参考文献7

二级参考文献41

  • 1李建欣,怀进鹏.COTN:基于契约的信任协商系统[J].计算机学报,2006,29(8):1290-1300. 被引量:18
  • 2Maurer U. Modeling a public-key infrastrueture//Proceedings of the European Symposium on Research in Computer Security (ESORICS). London, UK, 1996:325-350.
  • 3Lampson B, Abadi M, Burrows M, Wobber E. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 1992, 10(4) : 265-310.
  • 4Burrows M, Abadi M, Needham R M. A logic of authentication//Proceedings of the Royal Society of London A, 1989: 233-271.
  • 5Blaze M, Feigenbaum J, Lacy J. Decentralized trust management//Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA, USA, 1996 :164-173.
  • 6Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust management framework//Proceedings of the 2002 IEEE Symposium on Security and Privacy. Berkeley, California, 2002:114-130.
  • 7Jim T. SD3: A trust management system with certified evaluation//Proceedings of the 2001 IEEE Symposium on Security and Privacy. Oakland, California, USA, 2001:106-115.
  • 8Freudenthal E, Pesin T, Port L, Keenan E. dRBAC: Distributed role-based access control for dynamic coalition environments//Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS' 02). Vienna, Austria, 2002:411-420.
  • 9Chu Y-H, Feigenbaum J, LaMaechia B, Resniek P, Strauss M. REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems, 1997, 29(8/13): 953-964.
  • 10Hintikka J. Knowledge and Belief. New York.. Cornell University Press, 1962.

共引文献283

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部