期刊文献+

一种有效的信任协商多方安全计算模型 被引量:1

Efficient secure multi-party function computation scheme for trust negotiation
下载PDF
导出
摘要 以DataLog逻辑描述语言的Herbrand模型为基础定义策略语言,实现访问控制与授权控制逻辑,提出了积极协商策略,以解决信任协商中的多方协商问题。 This paper introduced the theory of Herbrand model for Datalog which could be applied to trust negotiation.It defined a Datalog-based policy language,authorization and released control logic and negotiation protocol.
出处 《计算机应用研究》 CSCD 北大核心 2012年第1期290-293,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2006AA01Z147) 江苏省高技术研究资助项目(BG2005020)
关键词 自动信任协商 访问控制 授权 策略 automated trust negotiation access control authorization strategy
  • 相关文献

参考文献9

  • 1WINSBOROUGH W H, SEAMONS K E, JONES V E. Automated trust negotiation [ C ]//DARPA Information Survivability Conference and Exposition. New York : IEEE Press ,2000:88-102. 被引量:1
  • 2LI N H, MITCHELL J C, WINSBOROUGH W H. Design of a rolebased trust management framework[ C ]//Proc of the 2002 IEEE Symposium on Security and Privacy. Washington DC : IEEE Computer Society Press, 2002 : 114-130. 被引量:1
  • 3LI N H, WINSBOROUGH W H, MITCHELL J C. Distributed credential chain discovery in trust management [ C ]//Proc of the 8th ACM Conference. 2001 : 156-165. 被引量:1
  • 4SEAMONS K E,WINSLETF M,YU T. et al. Protecting privacy during on-line trust negotiation [ C ]//Proc of the 2nd Workshop on Privacy Enhancing Technologies. Berlin : Springer-Verlag,2002. 被引量:1
  • 5YU T, WINSLETT M. SEAMONS K E, et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation [ J ]. ACM Trans on Information and System Security,2003,6( 1 ). 被引量:1
  • 6Yu T. Automated trust establishment in open systems [ D ]. Illinois: University of Illinois, 2003. 被引量:1
  • 7De TREVILLE J. Binder, a logic-based security language [ C ]//Proc of IEEE Symposium on Security and Privacy. Washington DC:IEEE Computer Society ,2002. 被引量:1
  • 8SEAMONS K E, WINSLETT M, YU T, et al. Limiting the disclosure of access control policies during automated trust negotiation [ C ]// Network and Distributed System Security Symposium. 2001. 被引量:1
  • 9DIJKSTRA E W, SCHOLTEN C S. Termination detection for diffusing computations [ J ]. Information Processing Letters, 1980, 11 (1) :134-145. 被引量:1

同被引文献9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部