期刊文献+

一种基于多样化历史信息的自动信任协商策略

Automated Trust Negotiation Based on Diverse History Information
在线阅读 下载PDF
导出
摘要 针对自动信任协商的协商效率问题,提出了一种基于多样化历史信息的自动信任协商策略。本策略将历史信息作用于协商过程中,利用策略有向图来完成协商;利用票证来存储历史协商信息,并采用数字签名技术来保证信息的真实性和完整性。根据历史协商信息在产生方式上的不同,提出了信任票证和历史票证,并结合其特点设计了相关的格式以及验证和工作过程。最后进行了实验仿真,结果表明该模型可以提高重复协商的效率。 For the problem of efficiency which appeares in the repeated automated trust negotiation,a negotiation strategy based on diverse history negotiation information was proposed.This strategy combines history information with negotiation by means of policy directed graph and ticket.The former one is used to finish the negotiation and the latter one is used to storage history negotiation information,meanwhile,digital signature technology is adopted to ensure the authenticity and integrity of the information.According to the different modes of history negotiation which is generated,trust-ticket and history-ticket were proposed.In addition,proper formation,verification and working procedure were designed in view of their characteristics.Finally,simulation results demonstrate that this model can improve efficiency in repeated negotiation.
出处 《计算机科学》 CSCD 北大核心 2016年第3期122-126,144,共6页 Computer Science
基金 国家自然科学基金项目(61073042)资助
关键词 自动信任协商 协商效率 策略有向图 历史协商信息 Automated trust negotiation Negotiation efficiency Policy directed graph Historic negotiation information
  • 相关文献

参考文献4

二级参考文献24

  • 1徐震,李斓,冯登国.基于角色的受限委托模型[J].软件学报,2005,16(5):970-978. 被引量:52
  • 2李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133. 被引量:52
  • 3廖振松,金海,李赤松,邹德清.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948. 被引量:52
  • 4冯真,张红旗,刘育楠.自动信任协商在P2P系统中的应用[J].计算机工程,2007,33(6):132-133. 被引量:1
  • 5EBay[EB/OL].[2010-04-13].http://www.ebay.com.
  • 6HOLT J E, BRANDSHAW R W, SEAMONS K E, et al. Hidden credentials[C/OL]// WPES'03. New York: ACM, 2003 [2010 -03 - 22]. http://citeseerx. ist. psu. edu/viewdoc/download? doi = 10.1.1.2. 5797&rep = repl &type = pdf.
  • 7LI JIANGTAO, LI NINGHUI. OACerts: Oblivious attribute certificates[ J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(4): 340-352.
  • 8LI JIANGTAO, LI NINGHUI, WINSBOROUGH W H. Automated trust negotiation using cryptographic credentials[ C]//ACM Conference on Computer and Communications Security. New York: ACM, 2005:100 - 108.
  • 9L Snyder. Formal Models of Capability-based Protection Systems[ J].IEEE Transactions on Computers, 1981,30(3 ) :172-181.
  • 10R Sandhu, E Coyne, H Feinstein. Role-based Access Control Models[ J]. IEEE Computer, 1996,29 (6) :38-47.

共引文献142

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部