期刊文献+

PKI信任度模型路径算法研究 被引量:7

Research on the Algorithm of Path in PKI Trust Valuation Model
在线阅读 下载PDF
导出
摘要 分析了分布式环境中信任的特点,总结了目前PKI体制中实体信任的缺陷,介绍了信任度机制以及信任路径中的两种独立路径-不相交路径和连通路径。结合图论中的最可靠路径算法,提出了一种PKI信任度模型中优化的可靠路径算法,提高了信任的准确性。 The trust's peculiarity in the distributed system is analyzed,the shortcoming of trust model in Public Key Infrastructure(PKI) is summarized,and the trust valuation mechanism,two notions of path independence-disjoint paths and connective paths are presented.Based on the most reliable path algorithm in graph theory,it proposes an optimization algorithm to improve the accuracy of trust relationship in the Public Key Infrastructure.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第21期182-185,共4页 Computer Engineering and Applications
关键词 PKI 信任度 最可靠路径 PKI,trust valuation,most reliability path
  • 相关文献

参考文献15

  • 1T Beth,M Borcherding,B Klein. Valuation of Trust in Open Networks[C].In:D Gollman Ed. Proc Computer Security-ESORICS ′94,1994:3~18
  • 2U Maurer. Modelling a Public-Key Infrastructure[C].In:E Bertino,H Kurth,G Martella eds. Computer Security-ESORICS ′96,1996
  • 3Josang,Ingar Glenn Pedersen,Dean Povey. PKI Seeks a Trusting Relationship[C].In:Proceedings of the 2000 Australasian Conference on Information Security and Privacy(ACISP2000) ,2000-07
  • 4M K Reiter,S G Stubblebine.Toward Acceptable Metrics of Authentication[C].In:Proc 1997 IEEE Symp Security and Privacy,1997 :10~20
  • 5M K Reiter,S G Stubblebine. Resilient Authentication Using Path Independence[J].IEEE Transactions on Computers,1998;47(12)
  • 6沙瀛,白硕.当前公开密钥基础设施的主要问题分析[J].微电子学与计算机,2002,19(6):18-21. 被引量:10
  • 7周瑞辉 冯登国.PKI系统的常用信任模型[J].产品与技术,2000,.
  • 8蒋辉柏,蔡震,容晓峰,周利华.PKI中几种信任模型的分析研究[J].计算机测量与控制,2003,11(3):201-204. 被引量:13
  • 9Ellison C,Schneier B.Ten Risk of PKI:You′re not being told about Public Key Infrastructure[J].Computer Security Journal, 2000; 16 (1)
  • 10Abdul-Rahman,a Hailes S.A distributed Trust model. In model[C].In:Proceedings of the 1997 New Security Paradigms Workshop Cumbria,UK:ACM Press, 1998:48~60

二级参考文献7

  • 1LLOYDCAS.公开密钥基础设施--概念、标准和实施[M].北京:人民邮电出版社,2001..
  • 2[1]C Ellison and B Schneier. Ten Risk of PKI:What you're not being told about Public Key Infrastructure. Computer Security Journal,2000,16(1):1~ 7. http:∥ www.counterpane.com/pki- risks.html
  • 3[2]Ronald L Rives. Can We Eliminate Certificate Revocation Lists?. 1999.
  • 4[3]Thierry Moreau. Thirteen Reasons to Say 'No' to Public Key Cryptography. Draft paper,March 4th,1998.(C) 1998 CONNOTECH Experts- conseils,Inc.
  • 5[4]Gerck E. Toward Real- World Models of Trust:Reliance on Received Information. Jan,1998.
  • 6[5]Roger Clarke. Conventional Public Key Infrastructure:An Artefact Ill- Fitted to the Needs of the Information Society. Nov,2000. http:∥ www.anu.edu.au/people/Roger. Clarke/II/PKIMisFit.html
  • 7[6]Gerck E. Certification:Intrinsic,Extrinsic,Combined. MCG. http:∥ www.mcg.org.br/cie.htm,1997.

共引文献20

同被引文献42

引证文献7

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部