期刊文献+

Trust Calculation and Delivery Control in Trust-Based Access Control 被引量:2

Trust Calculation and Delivery Control in Trust-Based Access Control
原文传递
导出
摘要 Trust management system has been a promising approach to solve the access control problems in open multi-domain environments. However, the calculation of trust and the delivery of the trust are not addressed effectively in the existing trust management systems. To address the problems, this paper proposes a scheme of trust calculation and delivery control. Compared with the other schemes, it is simpler and more flexible, and also easier to be implemented. Trust management system has been a promising approach to solve the access control problems in open multi-domain environments. However, the calculation of trust and the delivery of the trust are not addressed effectively in the existing trust management systems. To address the problems, this paper proposes a scheme of trust calculation and delivery control. Compared with the other schemes, it is simpler and more flexible, and also easier to be implemented.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期765-768,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China (60403027)
关键词 access control trust management trust calculation authorization delegation access control trust management trust calculation authorization delegation
  • 相关文献

参考文献1

二级参考文献16

  • 1Clarke D. , Elien J. E. , Ellison C. et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4):285-322
  • 2Li N. , Winsborough W. H. , Mitchell J. C.. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35-86
  • 3Zhu Xian, Wang Shao-Bin, Hong Fan et al. Distributed credential chain discovery in trust-management with parameterized roles. In:Proceedings of the 4th International Conference on Cryptology and Network Security (CANS05). Xiamen, China,2005, 334-348
  • 4Beth T. , Boreherding M. , Klein B.. Valuation of trust in open networks. In: Gollmann D. ed. Proceedings of the 3rd European Symposium on Research in Computer Security (ESORICS 94), Brighton, UK: Springer-Verlag, 1994, 3-18
  • 5Wang Lun-Wei, Liao Xiang-Ke, Wang Huai-Min. AT-PAM:Authentication Trustworthiness-based PAM. In: Proceedings of the 3rd International Conference on Information Security,Shanghai, China, 2004, 204-209
  • 6Jφsang A. , Pope S.. Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling(APCCM2005), Newcastle, NSW, Australia, Australian Computer Society, 2005, 59-68
  • 7Kapadia A. , Al-Muhtadi J. , Campbell R. H. , Mickunas D..IRBAC 2000: Secure interoperability using dynamic role translation. University of Illinois, DeKalb, Ill. , USA: Technical Report UIUCDCS-R-2000-2162, 2000
  • 8Shehab M. , Bertino E. , Ghafoor A.. SERAT: SEcure Rolem Appling Technique for decentralized secure interoperability.In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, 159-167.
  • 9Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1996, 164-173
  • 10Blaze M. , Feigenbaum J. , Ioannidis J. , Keromytis A. D..The KeyNote Trust-Management Version 2. RFC 2704, 1999.http://www.faqs.org/rfcs/rfc2704.html

共引文献29

同被引文献7

  • 1廖俊国,洪帆,朱更明,杨秋伟.基于信任度的授权委托模型[J].计算机学报,2006,29(8):1265-1270. 被引量:30
  • 2Li N, Winsborough W H, Mitchell J C. Distributed credential chain discovery in trust management [ J ]. Journal of Computer Security, 2003, 11 ( 1 ) : 35-86.
  • 3Zhu X, Wang S, Hong F, et al. Distributed credential chain discovery in trust-management with parameterized toles [ C ]// Desmedt Y G. Proceedings of the 4th International Conference on Cryptology and Network Security ( CANS05 ) LNCS 3810. Xiamen: SpringerVerlag, 2005: 334-348.
  • 4Li N, Mitchell J C, Winsborough W H. Design of a rolebased trust-management framework [ C ]//IEEE. Proceeding of the 2002 IEEE Symposium on Security and Privacy, Claremont Resort Oakland. California: IEEE, 2002: 114-130.
  • 5Freudenthal E, Pesin T, Port L, et al. dRBAC: distributed role-based access control for dynamic coalition environments. [ C ]//ICDCS. Proceedings of the 22nd International Conference on Distributed Computing Systems ( ICDCSCY2), Vienna : ICDCS, 2002:411-434.
  • 6雷建云,崔国华,章丽平,邢光林.可计算的基于信任的授权委托模型[J].计算机科学,2008,35(10):73-75. 被引量:7
  • 7陈峰,荣晓慧,邓攀,马世龙.设备协同技术及其系统软件研究综述[J].电子学报,2011,39(2):440-447. 被引量:7

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部