期刊文献+

分布式系统中综合的信任管理模型研究 被引量:1

Research on a Comprehensive Trust Management Model in Distributed Systems
在线阅读 下载PDF
导出
摘要 信任问题是分布式系统中的核心问题,包括授权委托,主观信任评估等方面.针对该问题的研究可以分为基于凭证的和基于证据的信任管理模型.为了提高信任管理问题的处理效率和灵活性,本文基于开放的思想,提出了综合凭证与证据的信任管理模型. Trust management is the core problem in distributed systems, including authorization delegating, subject trust evaluating and so on. Research on trust management model may be credential-based or evidence-based. A comprehensive trust management model into which credential-based and evidencebased components were integrated was proposed in this paper to improve efficiency and adaptability.
出处 《华南农业大学学报》 CAS CSCD 北大核心 2007年第2期113-115,共3页 Journal of South China Agricultural University
基金 国家自然科学基金(60573043) 广东省信息安全技术重点实验室开放基金(H06002)
关键词 信任管理 基于凭证的 基于证据的 信任管理模型 trust management credential-based evidence-based trust management model
  • 相关文献

参考文献10

  • 1BLAZE M,FREIGENBAUM J,LACY J.Decentralized trust management[C]//Proceedings of the 17th Symposium on Security and Privacy.[S.L.]:IEEE Computer Society Press,1996:164-173.
  • 2BLAZE M,FEIGENBAUM J,STRAUSS M.Compliance checking in policymaker trust management system[C]//Proceedings of the Financial Cryptography'98,Lecture Notes in Computer Science 1465,London:Springer-Verlag,1998:254-274.
  • 3BLAZE M,FEIGENBAUM J,IOANNIDIS J,et al.The keynote trust management system version 2[S].IETF RFC 2704,http://www.ietf.org/rfc/rfc2704.txt,1999-09-18.
  • 4CHU Y H,FEIGENBAUM J,LAMACCHIA B,et al.REFEREE:Trust management for web applications[J].World Wide Web Journal,1997,2(2):127-139.
  • 5NINGHUI LI,BENJAMIN N,GROSOF,FEIGENBAUM J.Delegation logic:A logic-based approach to distributed authorization[J].ACM Transactions on Information and Syetem Security,2003,6(1):128-171.
  • 6POVEY D.Developing electronic trust policies using a risk management model[C]//Proceedings of the International Exhibition and Congress on Secure NetworkingCQRE (Secure)'99,Lecture Notes In Computer Science.London:Spring-Verlag,1999:1-16.
  • 7ABDUAL-RAHMAN A,HAILES S.A distributed trust model[C]//Proceedings of the 1997 New Security Paradigms Workshop.Cumbria:ACM Press,1998:48-60.
  • 8BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]//GOLLMANN D.Proceedings of the european symposium on research in security (ESORICS).London:Springer-Verlag,1994:3-18.
  • 9JφSANG A.A model for trust in security systems[C]//Proceedings of the 2nd Nordic Workshop on Secure Computer Systems.Philadelphia:ACM Press,1997.
  • 10LI Ning-hui,WINSBOROUGH H,MITCHELL J C.Distributed Credential Chain Discovery in Trust Management[C]//Proceeding of the 8th ACM Conference on Computer and Communication Security.Philadelphia:ACM Press,2001:156-165.

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部