期刊文献+

基于带权有向图的授权委托模型 被引量:1

Authorization delegation model based on weighted directed graph
原文传递
导出
摘要 针对目前信任管理系统存在信任量化和传递、环状授权和冲突授权等问题,提出一种新的基于带权有向图的授权委托模型,使用带权有向图来表达主体之间的信任关系,很好地解决了这些问题.模型简单直观明了,其中的一致性验证算法经过分析和论证是正确而且有效的. To address the issues in the current trust management systems,such as evaluation and delivery of the trust,annular and conflicted delegation,a new authorization and delegation model based on weighted directed graph is brought forward.The weighted and directed graph is used to present the trust relationship between the entities.The model is simple and visual;and the algorithm of the consistence is analyzed and proved to be correct and efficient.
出处 《武汉大学学报(工学版)》 CAS CSCD 北大核心 2011年第6期797-800,共4页 Engineering Journal of Wuhan University
基金 国家自然科学基金项目(编号:60902053)
关键词 访问控制 信任管理 授权 委托 带权有向图 access control trust management authorization delegation weighted directed graph
  • 相关文献

参考文献5

  • 1Kapadia A, A1-Muhtadi J, Campbell R, Mickunas D. IRBAC 2000: secure interoperability using dynamic role translation [R]. Technical Report UIUCDCS-R- 2000-2162, University of Illinois, 2000 : 245-267.
  • 2Blaze M, Feigenbaum J, Lacy L. Decentralized trust management [C]//Proeeedings of the 17th Symposium on Security and Privacy. Oakland, California, USA. Los Alamitos.. IEEE CS Press, 1996..164-173.
  • 3Blaze M, Feigenbaum J, Strauss M, et al. Compliance checking in the PolicyMaker trust management system [C]//Proceedings of Second International Conference on Financial Cryptography. LNCS 1465. Anguila, British West Idles. 1998. Berlin Heidelberg: Springer- Verlag, 1998 ~254-274.
  • 4Blaze M, Feigenbaum J, Keromytis A D. KeyNote.. trust management for public key infrastructures [C]// Proceedings of the 6th Security Protocols International Workshop. LNCS 1550. Cambridge, UK. 1998. Ber- lin Heidelberg.. Springer-Verlag, 1999..59-63.
  • 5廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30

二级参考文献16

  • 1Clarke D. , Elien J. E. , Ellison C. et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 2Li N. , Winsborough W. H. , Mitchell J. C.. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35-86
  • 3Zhu Xian, Wang Shao-Bin, Hong Fan et al. Distributed credential chain discovery in trust-management with parameterized roles. In:Proceedings of the 4th International Conference on Cryptology and Network Security (CANS05). Xiamen, China,2005, 334-348
  • 4Beth T. , Boreherding M. , Klein B.. Valuation of trust in open networks. In: Gollmann D. ed. Proceedings of the 3rd European Symposium on Research in Computer Security (ESORICS 94), Brighton, UK: Springer-Verlag, 1994, 3-18
  • 5Wang Lun-Wei, Liao Xiang-Ke, Wang Huai-Min. AT-PAM:Authentication Trustworthiness-based PAM. In: Proceedings of the 3rd International Conference on Information Security,Shanghai, China, 2004, 204-209
  • 6Jφsang A. , Pope S.. Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling(APCCM2005), Newcastle, NSW, Australia, Australian Computer Society, 2005, 59-68
  • 7Kapadia A. , Al-Muhtadi J. , Campbell R. H. , Mickunas D..IRBAC 2000: Secure interoperability using dynamic role translation. University of Illinois, DeKalb, Ill. , USA: Technical Report UIUCDCS-R-2000-2162, 2000
  • 8Shehab M. , Bertino E. , Ghafoor A.. SERAT: SEcure Rolem Appling Technique for decentralized secure interoperability.In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, 159-167.
  • 9Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1996, 164-173
  • 10Blaze M. , Feigenbaum J. , Ioannidis J. , Keromytis A. D..The KeyNote Trust-Management Version 2. RFC 2704, 1999.http://www.faqs.org/rfcs/rfc2704.html

共引文献29

同被引文献8

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部