期刊文献+

面向代理服务的信任管理策略

The Trust Model Oriented Proxy:Design,Implement
下载PDF
导出
摘要 随着互联网技术的迅猛发展,使用互联网服务的人越来越多。网络代理作为互联网中的一项重要应用其用户数量也与日俱增。通过代理浏览恶意内容,进行匿名攻击等恶意使用代理的现象日趋严重。为了防止被滥用,许多代理使用了内容审计分析技术。而内容审计带来的处理延迟和开销严重影响了服务质量。针对内容分析的性能瓶颈问题,提出基于用户信任的审计加速策略。通过访问时间,目标网站类型等多个维度对代理用户行为进行细腻度的刻画,并充分考虑历史行为的累计效应,建立了多层次的用户信任模型,在完成内容审计功能的同时,提高基于内容分析可信代理的服务性能。 With the rapid growth of Internet technology,more and more people has enjoyed Internet service. As a important application,the number of the user of network proxy service has grew. The phenomenon of network proxy service abuse is more and more serious. In order to avoid network proxy service abuse,some proxy server adopt content analysis technology.The traditional analytical auditing based on the content is time consuming,which can impact the user's experience. In this paper a speed- up method of Content Audit based on user's trust has been proposed. Through the access time,the type of the target site and other dimensions,the user behavior has been exquisite portrayed,and the information of user historical actions has been token account of,then a multi- layered trust model has been constructed,which can improve the network proxy service quality.
出处 《智能计算机与应用》 2014年第2期40-44,共5页 Intelligent Computer and Applications
基金 国家高技术研究发展计划(863)(2010AA012504 2011AA010705) 国家重点基础研究发展计划(973)(2011CB302605) 国家自然科学基金(61173145 60203021)
关键词 网络管理 代理服务 内容审计 信任计算 Network Management Proxy Service Content Audit Trust Computing
  • 相关文献

参考文献7

二级参考文献76

  • 1宋光兴,杨德礼.电子商务中在线信誉管理系统设计的若干问题研究[J].系统工程,2004,22(9):5-9. 被引量:46
  • 2张宝社.Windows下的网络编程[M].合肥:中国科学技术大学出版社,1997..
  • 3涂育红 张颖江.Web数据库采集器的研究与实现:硕士论文[M].武汉:湖北工学院,1998..
  • 4周明德.Tcp/Ip网络原理与技术[M].北京:清华大学出版社,1993..
  • 5Saidani O,Nurcan S.A flexible organisation and role-based access control model for secure information systems[C]//ADVIS 2006: 364-376.
  • 6Shcn Hai-bo,Hong Fan.A context-aware role-based access control model for Web services[C]//Proceedings of IEEE International Conference on E-Business Engineering 2005.Piscataway, NJ:Institute of Electrical and Electronics Engineers Computer Society, 2005 : 220-223.
  • 7Liu Miao,Guo He-qing,Su Jin-dian.An attribute and role based access control model for Web services[C]//Proc of 2005 International Con-ference on Machine Learning and Cybernetics.Piscataway,NJ:Institute of Electrical and Electronics Engineers Computer Society,2005 : 1302-1306.
  • 8Oh S,Park-S.Task-role-based access control model[J].Information Systems, 2003,28 ( 6 ) : 533 -562.
  • 9Ray I,Toahchoodee M.A spatio-temporal role-based access control model[C]//DBSec 2007,2007:211-226.
  • 10Abdallah A E,Khayat E J.Formal Z specifications of several flat role-based access control models[C]//SEW 2006,2006:282-292.

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部