首页 | 本学科首页   官方微博 | 高级检索  
     

普适计算的信任计算模型
引用本文:郭亚军,洪帆.普适计算的信任计算模型[J].计算机科学,2005,32(10):59-62.
作者姓名:郭亚军  洪帆
作者单位:[1]华中科技大学计算机科学与技术学院数据安全与保密实验室,武汉430074 [2]华中师范大学计算机科学系,430079
基金项目:国家高技术研究发展计划(863)(No.863-301-1-3);国防预研基金(No.15-8-4);湖北省自然科学基金(编号:2005ABA243).
摘    要:信任和安全有紧密的联系,当前的安全技术都隐含地与信任相关.普适计算环境是一个开放的环境,相互合作的主体具有自发性和不可预知性.在互相不知道的主体之间进行交互,必须有足够级的信任.普适计算比传统计算更强调信任的作用.本文在分析普适计算的信任特征后给出了适合该环境的信任计算模型.证明了普适计算环境中的信任关系是偏序关系,根据信任Hasse图,我们给出了信任评估机制.最后分析表明该模型满足Lamsal的普适计算信任建模要求.

关 键 词:普适计算  信任  安全  信任模型

Trust Computing Model for Pervasive Computing
GUO Ya-Jun, HONG Fan.Trust Computing Model for Pervasive Computing[J].Computer Science,2005,32(10):59-62.
Authors:GUO Ya-Jun  HONG Fan
Affiliation:1School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074;2 Department of Computer Science,Central China Normal University,Wuhan 430079
Abstract:There exists a close relationship between trust and security. Current security techniques are involved implicit- ly in trust. Pervasive computing environment is an open environment in which principals collaborate spontaneously and unforeseeably. High enough trust is essential to ensure security among these principals in which pervasive computing pays more attention to the role of trust than traditional computing. In this paper, after analyzing the characteristics of pervasive computing, we present a formal trust computing model. Meanwhile, we prove that trust relationship in perva- sive computing is partial ordering and the approach to evaluate combination trust value is studied based on trust Hasse diagram. In the end, the analysis makes clear that the trust model proposed in this paper can meet Lamsal's trust mod- eling requirement of pervasive computing.
Keywords:Pervasive computing  Trust  Security  Trust model
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号