期刊文献+

网格资源访问的对等信任机制 被引量:2

P2P trust mechanism of grid resources access
下载PDF
导出
摘要 针对传统网格信任模型中倾向于资源使用者抉择资源而忽略资源提供者的抉择这一现象,分析了信任关系具有的特性,建立了基于域的对等信任模型,并提出了一种更能充分发挥网格资源效率的对等信任机制。该机制认为网格的实体具有资源使用阈值和资源提供阈值,网格实体在进行资源的共享和协同时,交互双方在使用资源和提供资源方面都需要根据相应的阈值抉择匹配的信任度,并通过推荐信任链路建立对等信任关系。 The traditional grid trust model tends to focus on the choice of resource users and ignors the suppliers. The characteristics of trust relation are analyzed, a P2P trust model based on domains is built, and a P2P trust mechanism is put forward, which can adequately exert the efficiency of grid resources. In the mechanism we think that the entity of grid has the resources usage threshold value and resources provision threshold value. During resource sharing and collaboration by grid entity, both communicative sides select matching trustworthiness on resource using and supplying, according to their specific threshold value. Finally P2P trust relation will be built up through the recommending trust network.
出处 《计算机工程与设计》 CSCD 北大核心 2009年第15期3544-3546,3576,共4页 Computer Engineering and Design
基金 西南大学研究生科技创新基金项目(2006011)
关键词 网格资源 信任阈值 信任机制 行为信任 对等信任 grid resources trust threshold value trust mechanism behavior trust peer-to-peer trust
  • 相关文献

参考文献4

二级参考文献37

  • 1王莉苹,杨寿保.网格环境中的一种信任模型[J].计算机工程与应用,2004,40(23):50-53. 被引量:32
  • 2周明辉,梅宏,焦文品.基于中间件的可定制信任管理框架[J].电子学报,2005,33(5):820-826. 被引量:8
  • 3王珊,高迎,程涛远,张坤龙.服务网格环境下基于行为的双层信任模型的研究[J].计算机应用,2005,25(9):1974-1977. 被引量:19
  • 4王晓斌,才书训.网格体系结构研究[J].计算机工程与设计,2005,26(12):3281-3284. 被引量:11
  • 5Blaze M, Feigenbaum J, Ioannidis J, Keromytis AD. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
  • 6Beth T, Borcherding M, Klein B. Valuation of trust in open network. In: Gol!mann D, ed. Proceedings of the European Symposiumon Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
  • 7Jcsang A. The right type of trust for distributed systems. In: Meadows C, ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead: ACM Press, 1996.
  • 8Jcsang A, Knapskog SJ. A metric for trusted systems. In: Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
  • 9Jcsang A. A subjective metric of authentication. In: Quisquater J, ed. Proceedings of the ESORICS'98. Louvain-la-Neuve.:Springer-Verlag, 1998. 329-344.
  • 10Gambetta D. Can we trust trust? In: Gambetta D, ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.

共引文献84

同被引文献18

  • 1干志勤,曾国荪.网格环境下的基于行为的信任评估模型[J].计算机应用与软件,2005,22(2):62-64. 被引量:14
  • 2Martin D, Burstein M, I-Iobbs J, Lassila O, McDermott D, McIlraith S, Narayanan S, Paolucci M, Parsia B, Payne T,Sirin E, Srinivasan N,Sycara K. OWL-S: Semantic markup for Web services. 2004 [EB/OL]. http://www, w3. org/Submission/OWL-S/.
  • 3YU Jian, et al. Service - Oriented Computing Principle and Application [ M ]. BeiJing: Qing Hua University publisher, 2006 : 211 -217.
  • 4Pu Guo - Lin, YANG Qing - Ping, QIU Yu - Hui. Composite Services Discovery Based on QoS [ J ]. In: 7th International Confer- ence on Advanced Language Processing and Web Information Technology. DaLian,2008:491 -496.
  • 5李杰.基于服务质量的Web服务模型及应用研究[D].北京:中科院硕士学位论文,2004:76.
  • 6WS - Security[ EB/OL]. http ://www. oasis - open. org/committees/wss/.
  • 7Liang - Jie Zhang, Jia Zhang, Hong Cai. Serv/ce Computing[ M ]. BeiJing: TsingHua University Press ,2007 : 7 - 10,141,158.
  • 8WS- Trust[ EB/OL] . http ://specs. xmlsoap, org/ws/2005/02/trust/WS -Trust. pdf.
  • 9WS - Pr/tacy[ EB/OL ]. http ://xml. coverpages, otg/ni2003 - 07 - 09 - a. htad.
  • 10WS -Authorization[ EB/OL]. http://download, boulder, ibm. com/ibmdl/pub/software/dw/specs/ws - fed/ws -authorization. xsd.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部