期刊文献+

信任协商的双重反馈模型DFM研究

Research of dual feedback model of trust negotiation
下载PDF
导出
摘要 资源在被拒绝访问时,用户通常接收到的反馈信息是无具体原因的"拒绝访问",使得合法的资源请求者无来由地被系统拒绝,影响了人机交互的友好性以及信任协商过程中的效率和成功率。提出一种针对在资源被拒绝访问时应用的反馈机制,根据资源请求者的身份和当前的系统环境这两个重要因素,建立一个反馈模型。实例证明该模型能够在不泄露敏感信息和策略的前提下,根据请求者的身份以及当前的系统状态提供有用而又适当的反馈信息。 When resources are denied access, users usually receive “access denied” feedback messages with no specific reasons, which makes the legitimate resources requesters be refused by system with no apparent reasons, and affects the friendliness of human-computer interaction and the efficiency and success rate during negotiation. For that reason, a feedback mechanism is proposed, which is applied on access denied, and a feedback model is built according to the identity of users and environment of system. Example shows that the model can provide useful and suitable feedback information based on the identity of users and environment of system, under the premise of non-disclosureof sensitive information and policies.
出处 《计算机工程与应用》 CSCD 2013年第4期99-103,112,共6页 Computer Engineering and Applications
基金 国家林业局"948"项目(No.N2010-4-05) 国家863高技术研究发展计划(No.2010AA101605-03)
关键词 反馈模型 信任协商 代价树 最小代价值 feedback model trust negotiation cost tree minimal cost
  • 相关文献

参考文献11

二级参考文献36

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 3[1]Bryant R E.Graph-based algorithm for boolean function manipulation [J].IEEE Transactions on Computers,1986,35(8):677-691
  • 4[2]Horst A.Inequalities for the constants of landau and lebesgue [J].Journal of Computational and Applied Mathematics,2002,139(2):15-24
  • 5[3]David E.Finding the k shortest paths[J].IEEE Foundations of Computer Science,1994,24(3):154-165
  • 6[4]Apu Kapadia.Geetanjali Sampemane.Roy H.Campbell.Know:Why your access was denied:regulating feedback for usable security[A].In Conference on Computer and Communications Security[C].Washington,2004.ACM Press,302-314
  • 7[5]William H W,Li Ninghui.Protecting sensitive attributes in automated trust negotiation[A].In Proceedings of Workshop on Privacy in the Electronic Society[C].Washington,2002.ACM Press,145-155
  • 8Chadwick D. W. , Otenko A.. The PERMIS X. 509 role based privilege management infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, California, USA, 2002, 135-140
  • 9Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the IEEE Symposium on Securityand Privacy, Oakland, CA, USA, 1996, 164-173
  • 10Li N. , Mitchell J. C. , Winsborough W. H.. Design of a Role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 2002, 114-130

共引文献96

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部