期刊文献+

一种基于模糊策略的自动信任协商方案 被引量:2

Scheme of Automated Trust Negotiation Based on Fuzzy Logic
下载PDF
导出
摘要 自动信任协商是一种在开放网络环境下陌生实体之间通过披露属性证书建立双方信任关系的重要手段。针对传统信任协商中协商规则描述较为严格、协商成功率和效率较低的问题,提出了一种基于模糊逻辑的自动信任协商方案,它通过将模糊逻辑引入信任协商,对信任协商规则进行模糊化处理,可以更简单而灵活地描述协商规则,并由此优化协商路径选择。分析表明,这种协商方案能够在一定程度上提高协商成功率和效率。 Automated trust negotiation (ATN) is an important method for establishing the trust between strangers in open network environment by disclosing attribute certificates. Because it is difficult to use tranditionat trust negotiation to describe the credential access control policies and establishing the trust is inefficient, a fuzzy logic-based scheme was proposed. By modeling the credential access control policies in fuzzy logic formula, the description will be more concise and flexible,and negotiation path will be optimized. The analysis shows that efficiency and success rate of this negotiation scheme can be improved to some extent.
出处 《计算机科学》 CSCD 北大核心 2015年第12期220-223,239,共5页 Computer Science
关键词 自动信任协商 模糊逻辑 属性证书 协商规则 协商策略 Automated trust negotiation, Fuzzy logic, Attribute certificate, Negotiation rule, Negotiation strategy
  • 相关文献

参考文献3

二级参考文献22

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 3Chadwick D. W. , Otenko A.. The PERMIS X. 509 role based privilege management infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, California, USA, 2002, 135-140
  • 4Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the IEEE Symposium on Securityand Privacy, Oakland, CA, USA, 1996, 164-173
  • 5Li N. , Mitchell J. C. , Winsborough W. H.. Design of a Role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, 2002, 114-130
  • 6Clarke D. , Ellen J. E. , Ellison C. , Fredette M. , Morcos A. ,Rivest R. L.. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 7Winsborough W. H. , Seamons K. E. , Jones V.E.. Automated trust negotiation. In: Proceedings of the DARPA Information Survivability Conference and Exposition, 2000, 88-102
  • 8Yu T. , Winslett M. , Seamons K.E.. Supporting structured credentials and sensitive policies through interoperahle strategies for automated trust negotiation. ACM Transactions on Information and System Security(TISSEC), 2003, 6(1): 1-42
  • 9Sun H., Zhu Y., Hu C., Huai J., Liu Y., Li J.. Early experience of remote and hot service deployment with trustworthiness in CROWN grid. In: Proceedings of the 6th International Workshop on Advanced Parallel Processing Technologies,Hong Kong, China, 2005, 301-312
  • 10Foster I. , Kesselman C. , Tuecke S.. The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 2001,15(3) : 200-222

共引文献93

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部