期刊文献+

基于图的具有时空约束的可信赖委托授权模型分析

Temporarily-Spatially Constrained Trustworthy and Delegable Authorization Model based on Graph
在线阅读 下载PDF
导出
摘要 分布式环境下需要可传递授权机制,而传统委托授权模型的委托授权不但缺乏对时间和空间的约束,而且仅是基于主体间的信任关系人为的确定可委托授权的主体,是不精确且模糊的。针对上述问题,文章提出了基于图的具有时空约束的可信赖委托授权模型,不仅利用模糊理论来确定可信赖的委托主体,而且增加了时间和空间的约束,分析并解决了循环授权和授权撤销问题。该模型满足了应用中的时空约束、可信赖传递授权等安全需求,具有普遍适用性。 Transferable authorizations are required in a distributed environment. Traditional delegable authorization model is not only lack of time and space constraints, but also determines the delegated subject with human brain based on the trust relationship between subjects. It's imprecise and fuzzy. Targeting the above problems, this paper puts forward temporarily-spatially constrained trustworthy and delegable authorization model based on graph., which determines trustworthy delegated subject using fuzzy theory and adds the spatio-temporal constraint. It also analysis and solves cyclic and revoked authorization problems. The model meets the security needs as spatio-temporal constraint and trustworthy authorizations in applications, and has general applicability.
作者 陈欣 乔佩利
出处 《信息网络安全》 2012年第10期51-53,共3页 Netinfo Security
关键词 分布式环境 委托授权 可信赖度 时空约束 distributed environment delegable authorization trustworthiness spatio-temporal constraint graph
  • 相关文献

参考文献6

  • 1Chakraborty S, Ray I. Trust BAC-Integrating trust relationships into the RBAC model for access control in open systems[C]. In Proc. of the 11th ACM Symp. on Access Control Models and Technologies. New York: ACM Press, 2006.49-58.
  • 2王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 3Takahashi K., Hagiya M. Abstraction of Graph Transformation using Temporal Formulas[C]. Supplemental Volume of the 2003 International Conference on Dependable Systems and Networks(DSN), 2003.65-66.
  • 4E.J.Chang, F.K.Hussain, T.S.Dillon. Fuzzy Nature of Trust and Dynamic Trust Modeling in Service Oriented Environments[C]. In Proceedings of the 2005 wordshop on Secure web services, 2005.75-83.
  • 5许万里,郑伟,苑惠娟.用相移干涉法测量表面三维轮廓的研究[J].传感器技术,2001,20(8):19-21. 被引量:9
  • 6李发根,钟笛.数字签密综述[J].信息网络安全,2011(12):1-8. 被引量:32

二级参考文献57

  • 1高宏,李庆祥,薛实福,顾晓渝.高分辨率光学轮廓仪[J].仪器仪表学报,1995,16(2):135-139. 被引量:9
  • 2张培强.MATLAB语言[M].中国科技大学出版社,1995..
  • 3Y. Zheng. Digital signcryption or how to achieve cost (signature & encryption). Cost (signature)+ cost (encryption) [C]Advances in Cryptology-CRYPTO' 97, LNCS 1294, Springer-Verlag, 1997. 165-179.
  • 4H. Petersen, M. Michels. Cryptanalysis and improvement of signcryption schemes[J]. IEE Proceedings-Computers and Digital Techniques, 1998, vol. 145, no. 2:149-151.
  • 5F. Bao, R.H. Deng. A signcryption scheme with signature directly verifiable by public key[C]In Proc. Public Key Cryptography-PKC' 98, LNCS 1431, Springer-Verlag, 1998.55-59.
  • 6D.H. Yum, P.J. Lee. New signcryption schemes based on KCDSA[C]lnformation Security and Cryptology-ICISC2001, LNCS 2288, Springer Verlag, 2002. 305-317.
  • 7J.B. Shin, K. Lee, and K. Shim. New DSA-verifiable signcryption schemes[C].Information Security and Cryptology-ICISC 2002, LNCS 2587, Springer-Verlag, 2003.35-47.
  • 8H.Y. Jung, D.H. Lee, J.l. Lim, and K.S. Chang, Signcryption schemes with forward secrecy[C]. Information Security Application-WISA 2001, Seoul, Korea, 2001. 463-475.
  • 9R. Steinfeld, Y. Zheng. A signcryption scheme based on integer factorization[C]lnformation Security Workshop-ISW 2000, LNCS 1975, Springer-Verlag, 2000. 308-322.
  • 10J. Malone-Lee and W. Mao, Two birds one stone: signcryption using RSA[CITopics in Cryptology-CT-P, SA 2003, LNCS 2612, Springer Verlag, 2003.211-226.

共引文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部