期刊文献+

ATMS:一个自治化信任管理系统

ATMS:autonomous trust-management system
下载PDF
导出
摘要 信任管理技术基于授权凭证签发、通过分布式凭证搜索验证信任关系链,有效实现了开放环境下的分布式授权和访问控制过程。然而,由于开放式环境下信任网络的复杂性和动态性,传统的信任管理系统在凭证搜索、凭证链的建立方面效率不高。针对这一问题,提出了一种自治化的信任管理系统,通过引入权限路由表的概念,使得凭证链建立的过程中,凭证的搜索能够始终导向权限请求的客体。在信任网络比较复杂,权限请求频繁的情况下,自治化的信任管理系统能够提高凭证搜索和凭证链建立的效率。 Trust Management implements the authorization procedure and access control decision in an open network environ- ment according to the credential issuing and the chain discovery algorithms. However, because of the complexity and dynamic of the trust network, the traditional trust-management system results in a low efficiency in credential discovery. To address the shortage, this paper proposes an autonomous trust-management system which introduces the concept of authority routing table. The system makes sure the direction of the search guides directly to the requester while finding the credential chain. While the trust network is complex and the right request happens frequently, the autonomous trust-management system can reduce the search cost and improve the efficiency in credential discovery.
作者 施文波 曹春
出处 《计算机工程与应用》 CSCD 2013年第14期45-50,共6页 Computer Engineering and Applications
基金 国家重点基础研究发展规划(973)(No.2009CB320702) 国家自然科学基金(No.60973044) 国家高技术研究发展计划(863)(No.2012AA011205)
关键词 信任管理 自治化 权限路由表 凭证链 信任域 trust-management autonomous authority routing table credential chain trust area
  • 相关文献

参考文献8

  • 1Samarati P,de Capitani di Vimercati S.Access control:poli- cies, models, and mechanisms[C]//Lecture Notes in Computer Science 2171,2001 : 137-196.
  • 2Blaze M,Feigenbaum J,Lacy J.Decentralized trust manage- ment[C]//Proceedings of the 1996 IEEE Symposium on Secu- rity and Privacy.[S.l.]: IEEE Computer Society Press, 1996: 164-173.
  • 3Li N, Mitchell J.RT: a role-based trust-management frame- work[C]//Proc 3rd DARPA Information Survivability Confer- ence and Exposition(DISCEX Ⅲ).[S.1.]: IEEE Computer Soci- ety Press, 2003 : 201-212.
  • 4Li Ninghui,Winsborough W H,Mitchell J C.Distributed cre- dential chain discovery in trust management[J].Joumal of Computer Security, 2003,11 ( 1 ) : 35-86.
  • 5Routing information protocol[EB/OL].[2012-03-11].http://rsync. tools.ietf.org/html/rfc 1058.
  • 6Chen K,Hwang K,Chen G.Heuristic discovery of role-based trust chains in peer-to-peer networks[J].IEEE Trans on Par- allel and Distributed System,2008.
  • 7Yao D, Tamassia R, Proctor S.On improving the perfor- mance of role-based cascaded delegation in ubiquitous com- puting[C]//Proceedings of IEEE/CreateNet Conference on Security and Privacy for Emerging Areas in Communica- tion Networks(SecureComm'05) ,2005 : 157-168.
  • 8Tamassia R, Yao D, Winsborough W H.Rolebased cascaded delegation[C]//Proceedings of the ACM Symposium on Access Control Models and Technologies(SACMAT' 04), 2004: 146-155.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部