期刊文献+

自动信任协商研究 被引量:52

Research on Automated Trust Negotiation
在线阅读 下载PDF
导出
摘要 在Internet日益孕育新技术和新应用的同时,交互主体间的生疏性以及共享资源的敏感性成为跨安全域信任建立的屏障.自动信任协商是通过协作主体间信任证、访问控制策略的交互披露,逐渐为各方建立信任关系的过程.系统介绍了这一崭新研究领域的理论研究和应用进展情况,并对信任协商中的协商模型、协商体系结构、访问控制策略规范、信任证描述及发现收集、协商策略及协商协议等多项关键技术的研究现状进行分析和点评,最后针对目前研究工作中存在的一些问题,对未来的研究方向及工作进行展望.通过对自动信任协商的研究及其进展的介绍,希望有助于在维护开放网络中主体自治性和隐私性的同时,研究更高效、实用的信任自动建立技术. The proliferation of the lnternet has given opport unities on different entities to share resources or conduct business transactions. However, how to establish trust among strangers without prior relationship and common security domain poses much difficulty for these activities. To resolve these problems, a promising approach known as Automated Trust Negotiation (ATN), which establishes the trust between strangers with iterative disclosure of credentials and access control policies, is proposed. In this paper, a comprehensive survey of research on ATN is presented, and some basic techniques, e.g. negotiation model and architecture, access control policy specification, credential description and credential chain discovery, are introduced and compared. Then based on the analysis o f the shortcomings and problem s of the techniques, the trend of research and application is discussed. All these work may contribute to the further work on trust establishment for entities with privacy protection and autonomy in open internet.
出处 《软件学报》 EI CSCD 北大核心 2006年第1期124-133,共10页 Journal of Software
基金 国家自然科学基金 国家高技术研究发展计划(863)~~
关键词 信息安全 信任协商 访问控制策略 信任证 协商策略 information security trust negotiation access control policy credential negotiation strategy
  • 相关文献

参考文献1

二级参考文献20

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210.
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112.
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173.
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf.
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html.
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700.
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18.
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63.
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139.
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf.

共引文献112

同被引文献526

引证文献52

二级引证文献112

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部