期刊文献+

自动信任协商中的敏感信息保护方案 被引量:5

Sensitive Information Protect Scheme in Automatic Trust Negotiation
原文传递
导出
摘要 已有的敏感信息保护方案不能完全满足一些应用的实际安全需求,在已有方案的基础上,提出了一个基于信任向量的敏感信息保护方案。参与信任协商的双方中,一方根据己方的安全策略和对另一方的信任评估结果可以有选择性地显露证书中的敏感属性。通过具体的应用实例说明了方案的实现过程,并分析了方案的安全性和其他性能。 The existing sensitive information protect schemes can not satisfy the actual security requirement of some applications.A trust vector based sensitive information protect scheme is presented based on the existing schemes.One side in trust negotiation can selectively disposes the sensitive attributes to the other side in trust negotiation procedure based on personal security policy and the trust evaluation result of the other.The implementation procedure is given in concrete application instances and the scheme is analyzed.
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2012年第3期137-140,共4页 Journal of Wuhan University of Technology
基金 国家自然科学基金(60902053)
关键词 访问控制 自动信任协商 敏感信息保护 信任评估 access control automatic trust negotiation sensitive information protect trust evaluation
  • 相关文献

参考文献10

  • 1Blaze M,Feigenbaum J,Lacy J.Decentralized Trust Management[C]//Proceedings of the 17th Symposium on Securityand Privacy.Los Alamitos:IEEE Press,1996:164-173.
  • 2Winsborough W H,Seamons K E,Jones V E.Automated Trust Negotiation[C]//Proceedings of DARPA InformationSurvivability Conference and Exposition.Los Alamitos:IEEE Press,2000:88-102.
  • 3Castelluccia C,Jarecki S,Tsudik G.Secret Handshakes from Ca-oblivious Encryption[C]//Advances in Cryptology-ASIACRPT 2004:10th International Conference on the Theory and Application of Cryptology and Information Security.New York:Springer Press,2004:293-307.
  • 4Li N,Du W,Boneh D.Oblivious Signature-based Envelope[C]//Proceedings of the 22th ACM Symposium on Principlesof Distributed Computing(PODC 2003).New York:ACM Press,2003:182-189.
  • 5Holt J,Bradshaw R,Seamons K,et.al.Hidden Credentials[C]//2nd ACM workshop on Privacy in the Electronic Soci-ety.New York:ACM Press,2003:1-8.
  • 6Balfanz D,Durfee G,Shankar N,et al.Secret Handshakes from Pairing-Based Key Agreements[C]//Proceedings of the2003IEEE Symposium on Secret and Privacy.Los Alamitos:IEEE Press,2003:80-196.
  • 7何岩,郑春瑛.一种基于多步直接传播的网格信任模型[J].武汉理工大学学报,2009,31(18):168-171. 被引量:1
  • 8Yu T,Winslett M,Seamons K E.Supporting Structured Credentials and Sensitive Policies Through Interoperable Strat-egies for Automated Trust Negotiation[J].ACM Transactions on Information and System Security(TISSEC),2003,6(1):1-42.
  • 9张荣清,李建欣,怀进鹏.网格计算环境中的安全信任协商系统[J].北京航空航天大学学报,2006,32(3):347-351. 被引量:4
  • 10廖俊国,洪帆,李俊,杨木祥.在信任协商中保密证书的敏感属性[J].通信学报,2008,29(6):20-25. 被引量:7

二级参考文献36

  • 1张荣清,李建欣,怀进鹏.网格计算环境中的安全信任协商系统[J].北京航空航天大学学报,2006,32(3):347-351. 被引量:4
  • 2I. Foster, C. Kesselman. The Grid: Blueprint for a Future Computing Infrastructure[ M]. San Francisco: Morgan Kaufmann Publishers, 1999.
  • 3M. Humphrey, M. Thompson. Security Implications of Typical Grid Computing Usage Scenarios[J]. Cluster Computing,2002, 5(3): 51-61.
  • 4Shanshan Song, Yu-Kwong Kwok,Kai Hwang. Security-Driven Hettristics and a Fast Genetic Mgorithm for Trusted Grid Job Scheduling [ C ]//Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05), IEEE Computer Society 2005.
  • 5Butt, Ali Raza; Adabala, Sumalatha; Kapadia, Nirav H. ; Figueiredo, Renato J. ; Fortes, Jose A.B.. Grid-computing portals and security issues[J]. Journal of Parallel and Distributed Computing,2003,63( 10):1006-1014.
  • 6C. Ziegler, G. Lausen. Spreading Activation Models for Trust Propagation. In: Proceedings of the IEEE International Conference on e- Technology, e-Commerce, and e-Service, Oakland[ J]. IEEE Computer Press. 2004,83-97.
  • 7R. Guha, R. Kumar, P. Raghavan,et al. Propagation of Trust and Distrust[C]//In: Proceedings of the 13th International WWW Conferece (WWW2004). New York: ACM Press, 2004:403-412.
  • 8Yu T,Winslett M.A unified scheme for resource protection in automated trust negotiation[A].IEEE Symposium on Security and Privacy[C].Berkeley,California:IEEE,2003.110~122
  • 9Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[A].Proceedings of 17th Symposium on Security and Privacy[C].Oakland:IEEE,1996.164 ~ 173
  • 10Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation[A].DARPA Information Survivability Conference and Exposition[C].IEEE,2000.88 ~ 102

共引文献9

同被引文献48

引证文献5

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部