期刊文献+

基于信任度的授权委托模型 被引量:30

Trust worthiness-Based Authorization Delegation Model
下载PDF
导出
摘要 在开放式环境中,信任管理是最常用的一种访问控制方法.但是,目前存在的信任管理系统存在以下不足(1)没有刻画实体之间的信任程度,与现实情况不相符合;(2)委托深度没有得到很好的控制.针对上述问题,提出了一种基于信任度的授权委托模型——TBAD模型(Trustworthiness-BasedAuthorizationDelegationmodel),探讨了TBAD模型的一致性验证算法,并结合具体实例对TBAD模型的使用进行了说明. Trust management is a common approach on access control in open environment. However, the existing trust management systems have some faults as follows. On the one hand, trustworthiness between entities is not described in these systems. This does not accord with facts. On the other hand, delegation depth is not controlled effectively. To address the problems, this paper proposes a trustworthiness-based authorization delegation model, called TBAD model, and discusses the algorithm of compliance checking in TBAD model, and illuminate the usage of TBAD model through a typical example.
出处 《计算机学报》 EI CSCD 北大核心 2006年第8期1265-1270,共6页 Chinese Journal of Computers
基金 国家自然科学基金(60403027) 湖南省自然科学基金(04JJ30048)资助.
关键词 TBAD模型 一致性验证 信任度 证书链查找 委托深度 TBAD model compliance checking trustworthiness discovery of credential chain delegation depth
  • 相关文献

参考文献16

  • 1Kapadia A. , Al-Muhtadi J. , Campbell R. H. , Mickunas D..IRBAC 2000: Secure interoperability using dynamic role translation. University of Illinois, DeKalb, Ill. , USA: Technical Report UIUCDCS-R-2000-2162, 2000 被引量:1
  • 2Shehab M. , Bertino E. , Ghafoor A.. SERAT: SEcure Rolem Appling Technique for decentralized secure interoperability.In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, 159-167. 被引量:1
  • 3Blaze M. , Feigenbaum J. , Lacy J.. Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1996, 164-173 被引量:1
  • 4Blaze M. , Feigenbaum J. , Ioannidis J. , Keromytis A. D..The KeyNote Trust-Management Version 2. RFC 2704, 1999.http://www.faqs.org/rfcs/rfc2704.html 被引量:1
  • 5Ellison C. , Frantz B. et al. SPKI Certificate Theory. RFC 2693, 1999. http://www.faqs.org/rfcs/rfc27693.html 被引量:1
  • 6Chu Yang-Hua, Feigenbaum J. et al. REFEREE: Trust management for Web applications. World Wide Web Journal,1997, 2(3):127-139 被引量:1
  • 7Li Ning-Hui, Mitchell J. C. , Winsborough W. H.. Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland,CA, USA, 2002, 114-130 被引量:1
  • 8Bertino E. , Ferrari E. , Squicciarini A.C.. Trust-X.. A Peerto Peer framework for trust negotiations. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7):827-842 被引量:1
  • 9Freudenthal E. , Pesin T. , Port L. , Keenan E. et al. dRBAC: Distributed role-based access control for dynamic coalition environments. In.. Proceedings of the 22nd International Conference on Distributed Computing Systems ( ICDCS' 02),Vienna, Austria, 2002, 411-434 被引量:1
  • 10Elien Jean-Emile. Certificate discovery using SPKI SDSI 2.0 certificates [M. S. dissertation]. Cambridge, MA, USA:M. I. T ECSE, 1998 被引量:1

同被引文献275

引证文献30

二级引证文献90

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部