期刊文献+

基于Pi-演算的信任网络形式化建模 被引量:2

Formal Modeling of Trust Networks Using Pi-Calculus
原文传递
导出
摘要 网格环境下实体信任网络的形式化建模是实现其仿真的关键环节,利用pi-演算刻画网格中信任网络的结构和交互。抽象定义信任网络,讨论信任网络节点与Pi-演算的对应关系,给出基于Pi-演算的信任网络建模规则和建模过程,借助pi-演算模型检测工具对提出的信任网络形式化系统进行行为分析与推演,结果表明其具有活性和安全性,且能有效满足用户在信任方面的服务质量需求。 The trust network in Grid environment is hard to be modeled due to its concurrency and distribution. So a process algebra approach to formalizing the trust network was proposed. The trust network was defined and the corresponding relationship was discussed between its nodes and pi-calculus. Besides, the rules of describing trust networks with pi-calculus were introduced. Based on these rules, the formal model of trust networks was established. Its validity was verified by MWB, a model checker of pi-calculus. Theoretical analysis shows the formal model proposed is live and safe, satisfying QoS requirements of users in trust.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2008年第1期57-61,116,共6页 Journal of System Simulation
基金 国家自然科学基金项目(60673157) 国家高技术研究发展计划(863计划)项目(2007AA01Z425) 国家重点基础研究发展计划(973计划)前期研究专项项目(2007CB316502)。
关键词 网格安全 信任网络 形式化建模 PI-演算 进程代数 grid security trust networks formal modeling pi-calculus process algebra
  • 相关文献

参考文献10

  • 1Foster I,Kesselman C.The Grid 2:Blueprint for a New Computing Infrastructure[M].San Francisco:Morgan Kaufmann Publisher,2004.
  • 2Caronni G.Walking the Web of Trust[C]// Proceedings of the 9th Workshop on Enabling Technologies (WET ICE'2000).Los Alomitos,CA:IEEE Computer Society Press,2000.
  • 3Victor B,Moller F.The Mobility Workbench:A Tool for the π-Calculus[C]// Proceedings of the 6th International Conference on Computer-Aided Verification.Berlin,Heidelberg:Springer-Verlag,1994:428-440.
  • 4Milner R.Communicating and Mobile Systems:The Pi-Calculus[M].Cambridge:Cambridge University Press,May 1999.
  • 5Agudo I,Lopez J,Montenegro J A.A representation model of trust relationships with delegation extensions[C]// Proceedings of the 3rd international conference on trust management.Berlin,Heidelberg:Springer-Verlag,2005:116-130.
  • 6Ruan C,Varadharajan V,and Zhang Y.Logic-based reasoning on delegatable authorizations[C]// Proceedings of the 13th International Symposium on Methodologies for Intelligent Systems.Berlin,Heidelberg:Springer-Verlag,2002:185-193.
  • 7Lodderstedt T,Basin D,Doser J.Secure UML:a UML-based modeling language for model-driven security[C]// Proceedings of the 5th International Conference on The Unified Modeling Language.Berlin,Heidelberg:Springer-Verlag,2002:426-441.
  • 8Josang A,Hayward R,Pope S.Trust network analysis with subjective logic[C]// Proceedings of the Twenty-Ninth Australasian Computer Science Conference (ACSC 2006),Darlinghurst,Australia.Australia:Australian Computer Society Publisher,2006:85-94.
  • 9袁巍,李津生,洪佩琳.一种P2P网络分布式信任模型及仿真[J].系统仿真学报,2006,18(4):938-942. 被引量:45
  • 10孟祥怡,张光卫,刘常昱,康建初,李鹤松.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,19(14):3310-3317. 被引量:36

二级参考文献33

共引文献77

同被引文献28

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部