期刊文献+

基于信任评估的网络访问模型 被引量:6

The Model of Network Access Based on Trust Evaluation
下载PDF
导出
摘要 随着用户访问网络服务需求量的不断增加,用户需要访问本身份域内的服务和不同身份域的服务,有时还要访问超出域内和域间范围的服务,域内和域间访问已经通过域内证书和域间可信票据得到了解决。在访问超出域内和域间范围的服务时,以用户为中心的身份管理体系中,由于服务提供者与身份提供者没有建立直接的关系,当用户访问服务提供者时,提交由身份提供者提供的身份和证书,服务提供者必须对身份提供者进行信任评估。在身份管理系统的支持下,网上交易各方行为的信用记录被全面和精确的记录,可以作为信任评估的客观依据,通过信任评估,使不同体系下的身份信息关联起来,实现使用少量的身份信息访问更多的网络服务,既改善了用户体验,又大大降低了用户网络访问所付出的人力成本。根据这种需求,文章提出了基于信任评估的网络访问模型,分别利用并行数字多方签名方案和顺序数字多方签名方案进行信任投票,根据信任评估结果,服务提供者决定是否接受用户证书,为用户提供服务。安全性分析表明该模型能够有效抵御多重攻击,获得求解离散对数困难问题的安全性。 Sometimes users have to access the service which beyond of the domain and different identity domains. In the user-centric identity management infrastructure, due to the service provider has not set up direct relationship with the identity provider, the user summit his or her own identity and certif icates when they access the service provider, the service provider must carry out trust measurement to the identity provider. To meet the requirement, the model of network access based on the trust evaluation is put forward, parallel and sequence digital multi-signature scheme are used for trust vote respectively, according to the result of trust evaluation, the service provider determines whether or not accept the user's certificate and provide service for the user. By trust evaluation, the identity information of different system is related, to achieve the use of a small amount of information access to more network services,. The security analysis shows that the model can resist multiple-attacks effectively.
出处 《信息网络安全》 2015年第10期14-23,共10页 Netinfo Security
基金 教育部新世纪优秀人才支持计划[NCET-11-0565] 广西高等学校科研项目[201204LX668 2012JGA422]
关键词 身份管理 信任评估 数字多方签名算法 网络访问 安全性分析 identity management trust evaluation digital multi-signature algovithm network access security analysis
  • 相关文献

参考文献21

  • 1ABHILASHA BHARGAV-SPANTZEL,ANNAC.SQUICCIARINI,AND ELISA BERTINO. Trust Negotiation in Identity Management[J]. Security & Privacy, 2007,5(2) :55 - 63.
  • 2Rajarajan Sampath, Deepak Goel. RATING: Rigorous Assessment of Trust in Identity Management[C]//Proceedings of the First International Conference on Availability, Reliability and Security. IEEE COMPUTER SOCIETY, 2006 : 10 -19.
  • 3Altmann, J. Sampath, R. UNIQUE: A User-Centric Framework for Network Identity Management [C]//Network Operations and Management Symposium. 10th IEEE/IFIP, 10.1109/NOMS. 2006:495 -506.
  • 4Daeseon Choi,Seung-Hun Jin and Hyunsoo Yoon. Trust Management for User-Centric Identity Management on the Internet[C]// ISCE 2007, IEEE International Symposium. Consumer Electronics, 2007:1-4.
  • 5李建,周化钢,彭越,任其达.以用户为中心的可信终端身份管理模型[J].信息网络安全,2014(4):1-6. 被引量:5
  • 6李建,王青龙,沈昌祥,刘毅.无单向Hash函数的数字多签名方案[J].计算机工程与设计,2008,29(8):1938-1941. 被引量:3
  • 7M. Burmester, Y. Desmedt, Hiroshi Doi, et al. A Structured E1Gamal-Type Multisignature Scheme[J]. PKC2000, 2000,LNCS1751: 466-483.
  • 8袁艳祥,游林.基于身份加密的可认证密钥协商协议[J].信息网络安全,2014(3):1-6. 被引量:11
  • 9Mitsuru Tada. An Order-Specified Multisignature Scheme Secure Against Active Insider Attacks[C]//L. Batten, J. Seberry. ACISP2002. Melbourne: Springer Berlin/Heidelberg 2002: 57-106.
  • 10王标,陈持协,孙谋,邬静阳.环Zn上广义圆锥曲线多重数字签名方案的分析与改进[J].信息网络安全,2014(4):60-63. 被引量:3

二级参考文献46

共引文献16

同被引文献50

  • 1张琳,饶凯莉,王汝传.云计算环境下基于评价可信度的动态信任评估模型[J].通信学报,2013,34(S1):31-37. 被引量:6
  • 2杨芙清.软件工程技术发展思索[J].软件学报,2005,16(1):1-7. 被引量:266
  • 3王远,吕建,徐锋,张林.一个适用于网构软件的信任度量及演化模型[J].软件学报,2006,17(4):682-690. 被引量:50
  • 4郭树行,兰雨晴,金茂忠.软件构件的可信保证研究[J].计算机科学,2007,34(5):243-246. 被引量:14
  • 5BROSSO I,NEVE A,BRESSAN G.A Continuous Authentication System Based on User Behavior Analysis[J].Nature Photonics, 2010, 4(10):700-705.
  • 6DILLON T, WU Cang. Cloud Computing:Issues and Challenges[J]. IEEE International Conference on Advanced Information Networking & Applications, 2010, 4(4):27-33.
  • 7DAVID O, JAQUET C.Trust and Identification in the Light of Virtual Persons[EB/OL].http://www.~dis.net/resources/deliverables/ identify- of-identify/,2011-3-10.
  • 8BOUTABA R. Cloud Computing: State-of-the-art and Research ChaUenges[J]. Journal of Intemet Services and Applications, 2010, 1(1): 7-18.
  • 9XIONG Li, LIU Ling.Peertrust:Supporting Reputation-based Trust for Peer-to-Peer Electronic Communities[J].IEEE Transactions on Knowledge and Data Engineering, 2004,16(7):843-857.
  • 10KEN Kui, WANG Cong, WANG Qian .Security Challenges for the Public Cloud[I].IEEE Intemet Computing, 2012,16(1~:69-73.

引证文献6

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部