首页 | 本学科首页   官方微博 | 高级检索  
     

对等网络安全访问控制方案
引用本文:王晓明.对等网络安全访问控制方案[J].计算机工程,2008,34(7):165-167.
作者姓名:王晓明
作者单位:暨南大学计算机系,广州,510632
基金项目:国家自然科学基金 , 广东省自然科学基金
摘    要:提出一个安全对等访问控制方案,该方案采用两层访问控制策略:一层主要对成员资格进行审核,屏蔽一些不符合对等网络安全要求的成员;另一层基于可信值的访问控制策略,对进入对等网络后的成员行为进行评估,根据评估的可信值来决定赋予该成员访问网络资源的权限。当发现恶意成员时,网络能废除这些成员,实现对等网络的安全访问控制。

关 键 词:对等网络  访问控制  可信值评估  废除恶意成员
文章编号:1000-3428(2008)07-0165-03
修稿时间:2007年4月5日

Secure Access Control Scheme for Peer-to-Peer Networks
WANG Xiao-ming.Secure Access Control Scheme for Peer-to-Peer Networks[J].Computer Engineering,2008,34(7):165-167.
Authors:WANG Xiao-ming
Affiliation:(Department of Computer, Jinan University, Guangzhou 510632)
Abstract:The paper proposes a secure access control scheme for P2P(Peer-to-Peer) networks and explores the use of the two layers of access control mechanisms to provide security services such as joining the P2P network, using P2P network’s resource etc. Firstly, a new member is audited if he can enter into P2P network based on secure requirements and the members undesired for P2P network are eliminated. Secondly, the member ‘s trusted value is rated in P2P network and his access right to P2P network’s resource is assigned based on trusted access control mechanism. The scheme can revoke out the malicious members from P2P network. Therefore the scheme can realize secure access control for P2P network.
Keywords:P2P networks  access control  trust rating  revoked malicious members
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号