期刊文献+

自动信任协商的形式化描述与验证研究 被引量:7

Research on formal description and verification of automated trust negotiation
在线阅读 下载PDF
导出
摘要 首先提出了自动信任协商的通用形式化框架,并将典型的信任协商策略规约到上述框架内;其次,基于上述形式化框架对自动信任协商的形式化验证问题进行了定义,确定了形式化验证的目标以及一般流程;再次,研究了典型信任协商策略的形式化验证问题,讨论了相关问题的计算复杂性并得到系列结论;最后,利用逻辑编程方法和模型检测方法实现了自动信任协商的形式化验证。实验结果表明,规则数是影响形式化验证系统运行时间的关键因素,逻辑编程方法和模型检测方法在规则较少时效率较高,但逻辑编程方法的可扩展性不及模型检测方法。 First,a unified ATN formal framework was presented,into which typical negotiation strategies could be reduced.Second,the formal verification of ATN was defined based on the formal framework.The objectives and procedures of the formal verification of ATN were described.Third,several typical negotiation strategies were discussed,and the computational complexity of the corresponding verification problems was shown,several conclusions had been obtained.Last,the formal verification of ATN was implemented by using logic programming and model checking methods.The experimental results show that the number of rules is a crucial factor in determining the runtime.Both logic programming and model checking are efficient when the number of transition rules is small,and logic programming does not scale as well as model checking.
出处 《通信学报》 EI CSCD 北大核心 2011年第2期86-99,共14页 Journal on Communications
基金 国家自然科学基金资助项目(60773118) 国家高技术研究发展计划("863"计划)基金资助项目(2006AA01A109 2009AA01Z108)~~
关键词 访问控制 信任协商 形式化方法 计算复杂性 安全性 access control trust negotiation formal methods computational complexity security
  • 相关文献

参考文献26

  • 1林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:68
  • 2TOLONE W, AHN G J, PAl T. Access control in collaborative systems[J]. ACM Computing Surveys, 2005, 37(I): 29-41.
  • 3CHAPIN P C, SKALKA C, WANG X S. Authorization in trust management: features and foundations[J]. ACM Computing Surveys, 2008, 40(3): 9-48.
  • 4WINSBOROUGH W H, SEAMONS K E, JONES V E. Automated trust negotiation[A]. Proc of the DARPA Information Survivability Conference and Exposition[C]. Hilton Head, South Carolina, USA, 2000, 88-10.
  • 5SKOGSRUD H, MOTAHARI-NETMAD H R, BENATALLAH B, et al. Modeling trust negotiation for Web services[J]. Computer, 2009, 42(2): 54-61.
  • 6廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 7WINSBOROUGH W H, LI N H. Towards practical automated trust negotiation[A]. Pro of the 3rd International Workshop on Policies for Distributed Systems and Networks[C]. Monterey, CA, USA, 2002. 92-103.
  • 8WINSLETF M, YU T, SEAMONS K E, et al. Negotiating trust on the Web[J]. IEEE Internet Computing, 2002, 6(6): 30-37.
  • 9GUAN S Y, DONG X S, ZHAO Jet al. FORT: a decentralized automated trust negotiation framework for grids[A]. Proc of the 12th International Conference on CSCWD[C]. Xi'an, Shaanxi, China, 2008, 783-788.
  • 10YU T, WINSLETT M, SEAMONS K E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation[J]. ACM Transactions on Information and System Security, 2003, 6(1): 1-42.

二级参考文献33

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 2徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 3李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 4Sandhu R,Bhamidipati V,Munawer Q.The ARBAC97 model for role-based administration of roles.ACM Trans.on Information and Systems Security (TISSEC),1999,2(1):105-135.
  • 5Oh S,Sandhu R.A model for role administration using organization structure.In:Sandhu R,Bertino E,eds.Proc.of the 6th ACM Symp.on Access Control Models and Technologies (SACMAT 2002).Monterey:ACM Press,2002.155-162.
  • 6Crampton J,Loizou G.Administrative scope:A foundation for role-based administrative models.ACM Trans.on Information and System Security (TISSEC),2003,6(2):201-231.
  • 7Sandhu R,Coyne EJ,Feinstein HL,Youman CE.Role-Based access control models.IEEE Computer,1996,29(2):38-47.
  • 8Sandhu R.Rationale for the RBAC96 family of access control models.In:Youman C,Sandhu R,Coyne E,eds.Proc.of the 1st ACM Workshop on Role-Based Access Control.New York:ACM Press,1996.38-47.
  • 9Hong F,He XB,Xu ZY.Role-Based access control.Mini-micro system,2000,21(2):198-200 (in Chinese with English abstract).
  • 10Harrison MA,Ruzzo WL,Ullman JD.Protection in operation systems.Communications of the ACM,1976,19(8):461-471.

共引文献161

同被引文献50

引证文献7

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部