期刊文献+

一种开放网络环境下的分布式信任证明算法

A Distributed Trust Proving Algorithm for Open Networking Systems
下载PDF
导出
摘要 目前大多数信任证搜集技术采用传统的信任协商方法收集信任证,这给信任服务器带来很大负载且存在信任证盲目搜索问题。本文介绍了一个信任分布式证明协商算法DPN。基于RTP策略语言,DPN能够智能地对信任关系进行远程证明或本地推演,从而能够提高信任建立的效率。DPN能够给出证明协商过程中的相关信任规则纪录,支持对信任建立过程的验证。分析了算法的正确性和完整性,并通过实验证明了算法带来的性能提升。 The traditional trust negotiation methods bring a heavy burden to the trust server and have the blind credential fetching problem.This paper presents a distributed proving and negotiation(DPN) algorithm based on the RTP policy language.DPN can intelligently do a remote trust proving or a local trust negotiation,which can improve the efficiency for trust constructing.Moreover,through recording all the related rules used in the algorithm,DPN can support the verification of the trust proof.Both the correctness and completeness of the algorithm are analyzed,and the experimental results demonstrate the performance improvement of DPN.
出处 《计算机工程与科学》 CSCD 北大核心 2011年第6期1-5,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(2009AA01Z423)
关键词 信任协商 分布式证明 启发规则 trust negotiation distributed proving proof hint
  • 相关文献

参考文献11

  • 1Winslett M,Yu T,Seamons K E,et al.The TrustBuilder Architecture for Trust Negotiation[J].IEEE Internet Computing,2002,6(6):30-37.
  • 2Bertino E,Ferrari E,Squicciarini A C.Trust-X:A Peer-to-Peer Framework for Trust Establishment[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7):827-842.
  • 3李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 4Li N H,Mitchell J C,Winsborough W H.Design of a Role-Based Trust Management Framework[C]∥Proc of the 2002 IEEE Symp on Security and Privacy,2002:114-130.
  • 5Winsborough W H,Seamons K E,Jones V E.Automated Trust Negotiation[C]∥Proc of DARPA Information Survivability Conf and Exposition,2000:88-102.
  • 6Winslett M,Zhang C,Bonatti P A.PeerAccess:A Logic for Distributed Authorization[C]∥Proc of ACM Conf on Computer and Communications Security,2005:168-179.
  • 7王小峰,苏金树,张强,张一鸣.面向分布式证明的信任协商策略语言和方法[J].软件学报,2009,20(10):2776-2786. 被引量:1
  • 8Lee A J,Winslett M.Safety and Consistency in Policy-Based Authorization Systems[C]∥Proc of ACM Conf on Computer and Communications Security,2006:124-133.
  • 9Li N H,Winsborough W H,Mitchell J C.Distributed Credential Chain Discovery in Trust Management[C]∥Proc of the 8th ACM Conf on Computer and Communications Security,2001:156-165.
  • 10Minami K,Kotz D.Scalability in a Secure Distributed Proof System[C]∥Proc of International Conf on Pervasive Computing,2006:220-237.

二级参考文献4

共引文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部