期刊文献+

一种信任管理系统中层次式monitor机制的设计与实现 被引量:3

Design and Implementation of Cascaded Monitor in Trust Management System
下载PDF
导出
摘要 信任链发现是信任管理的主要内容.由于在分布式环境中凭证分布于各个节点,并且对于相同或相似的请求现有的信任链发现算法需要大量重复的通信和计算开销进行凭证的搜集和验证,极大地影响了信任关系验证的效率.在分布式信任链发现算法的基础上,结合网络中的信任关系相对稳定的特点,基于缓存的原理实现了一个可扩展的层次式monitor机制用于保存信任链发现过程中产生的中间结果,并且采用订阅机制保证其有效性,从而有效避免对相似的信任关系验证而产生的重复通信和计算开销.实验表明,采用该机制的分布式信任链发现算法在信任关系相对稳定的情形下具有较高的效率. Trust chain discovery is the main focus of the trust management system. In distributed systems, the credentials are stored on the nodes which spread around the network. There are too many redundancies among these credentials. Current trust chain discovery mechanisms spend much time on collecting credentials from many different nodes, and waste many computing resources to verifying the redundant credentials. Based on the current distributed trust chain discovery algorithms, this paper proposes an extensible cascaded monitor mechanism which makes use of the stability of the trust relationships and the similarity of the credentials to boost trust chain discovery process. The cascaded monitors can save the intermediate knowledge generated during the trust chain discovery process, and can be used in succession. It reduces the time of the communication and the cost of the computation for collecting and verifying the credentials markedly. The experiment shows that the algorithms with the cascaded monitor mechanism are more efficient than the others, especially, for the situation where are many stable trust relationships.
出处 《南京大学学报(自然科学版)》 CAS CSCD 北大核心 2007年第2期191-198,共8页 Journal of Nanjing University(Natural Science)
基金 国家973项目(2002CB312002) 国家863计划(2006AA01Z159) 国家自然科学基金(60603034) 江苏省自然科学基金(BK2006712)
关键词 信任管理 信任链 凭证 缓存 监视 trust management, trust chain, credential, cache, monitor
  • 相关文献

参考文献10

  • 1徐锋,吕建,陶先平,郭瑞景,苏敏,陈红强.MABEMS:一个基于移动Agent的电子市场空间[J].南京大学学报(自然科学版),2002,38(2):131-138. 被引量:8
  • 2徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 3Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. Proceedings of the 17th Symposium on Security and Privacy. Oakland: IEEE, 1996, 164~173. 被引量:1
  • 4Clarke D, Elien J, Ellison C, et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4) :285~322. 被引量:1
  • 5Sameer A, Dwaine E C, Chuang-Hue M, et al. ConChord: Cooperative SDSI certificate storage and name resolution. Proceedings of the First International Workshop on Peer-to-peer Systems (IPTPS), 2002, 141~154. 被引量:1
  • 6Li N H, John C M. RT.. A Role-based trust management framework. The Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX iii). Los Alamitos: IEEE, 2003, 201~212. 被引量:1
  • 7Li N H, William H W, John C M. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11 ( 1 ) : 35~86. 被引量:1
  • 8Li N H, John C M, William H W, et al. RTML. A Role-based trust-management markup language. CERIAS Technical Report, 2004-03. 被引量:1
  • 9Eric F, Tracy P, Lawrence P, et al. dRBAC: Distributed role-based access control for dynamic coalition environments. The Proceedings of the 22nd International Conference on Distributed Computing Systems ( ICDCS ' 02 ). Vienna:IEEE, 2002, 294~306. 被引量:1
  • 10Roberto T, Danfeng Y, William H W. Rolebased cascaded delegation. Access Management for Distributed Systems, 2004, 146~155. 被引量:1

二级参考文献21

  • 1Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185~210. 被引量:1
  • 2Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997,2(3):77~112. 被引量:1
  • 3Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164~173. 被引量:1
  • 4Abdul-Rahman, A., Hailes, S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop. Cumbria, UK: ACM Press, 1998. 48~60. http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-model1997.pdf. 被引量:1
  • 5Abdul-Rahman, A., Hailes, S. Using recommendations for managing trust in distributed systems. In: Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97). Kuala Lumpur: IEEE Press, 1997. http://citeseer.nj.nec.com/ 360414.html. 被引量:1
  • 6Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems--a distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50~164. http://isbn.nu/0818633700. 被引量:1
  • 7Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3~18. 被引量:1
  • 8Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag, 1999. 59~63. 被引量:1
  • 9Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal, 1997,2(2):127~139. 被引量:1
  • 10Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1~16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf. 被引量:1

共引文献119

同被引文献31

  • 1胡剑军,刘明迪.一种基于Jini技术的移动Agent模型[J].计算机工程与应用,2004,40(16):146-148. 被引量:3
  • 2郭春香,郭耀煌.不完整格的格序化[J].西南交通大学学报,2005,40(2):269-272. 被引量:4
  • 3李鸿儒,魏平.基于不可约元的概念格属性特征识别方法[J].计算机科学,2006,33(6):175-178. 被引量:4
  • 4Satyanarayanan M. Pervasive computing: Vision and challenges. IEEE Personal Communications, 2001, 8(4): 10-17. 被引量:1
  • 5Garlan D, Siewiorek D P, Smailagic A, et al. Project aura: Toward distraction-free pervasive computing. IEEE Pervasive Computing, 2002, 1(2):22-31. 被引量:1
  • 6Weiser M. The computer for the 21st century. Scientific American, 1991, 261(30) :94-104. 被引量:1
  • 7Antoine Fillinger NIST Smart Space Laboratory. http://www. nist. gov/smartspace/. 2008-06. 被引量:1
  • 8Balan R, Flinn J, Satyanarayanan M, et al. The case for cyber foraging. Proceedings of the 10th ACM SIGOPS European Workshop, Saint- Emilion, France, 2002, 87-92. 被引量:1
  • 9Want R, Pering T, Danneels G, et al. The personal server: Changing the way we think about ubiquitous computing. Borriello G H. Proceedings of the 4th International Conference on Ubiquitous Computing. Berlin= Springer, 2002, 194-209. 被引量:1
  • 10Jini Network Technolgoy. http://www. sun. com/software/jini . 1998-11. 被引量:1

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部