首页 | 本学科首页   官方微博 | 高级检索  
     

基于标签树的自动信任协商策略分析
引用本文:夏冬梅,曾国荪,陈波,鲍宇.基于标签树的自动信任协商策略分析[J].计算机科学,2009,36(12):154-157.
作者姓名:夏冬梅  曾国荪  陈波  鲍宇
作者单位:1. 同济大学计算机科学与技术系,上海,201804
2. 同济大学嵌入式系统与服务计算教育部重点实验室,上海,201804
基金项目:863专项,973课题,国家自然基金项目 
摘    要:网络实体间的信任建立是彼此进行安全交互的前提,自动信任协商为分布式环境下陌生实体的信任建立提供了方法.但现有的信任协商默认协商中访问控制策略正确,而策略本身很可能存在某些问题,导致协商失败.重点分析协商策略的性质,首先针对可能存在的冲突策略、平凡策略等策略不一致问题,构建了一种基于标签树的逻辑证明方法,进行策略一致性的检测,并证明了此证明方法的可靠性、完备性;其次,通过对策略树进行化简以求得最小证书集,并对其进行一次性披露和匹配,尽快达成成功协商,从而避免策略环问题,提高协商效率及成功率.

关 键 词:自动信任协商  访问控制策略  一致性  策略环
收稿时间:1/7/2009 12:00:00 AM
修稿时间:2009/3/16 0:00:00

Analysis of Automated Trust Negotiation Policy Based on Label Tree
XIA Dong-mei,ZEN Guo-sun,CHEN Bo,BA Yu.Analysis of Automated Trust Negotiation Policy Based on Label Tree[J].Computer Science,2009,36(12):154-157.
Authors:XIA Dong-mei  ZEN Guo-sun  CHEN Bo  BA Yu
Affiliation:(Department of Computer Science and Technology,Tongji University,Shanghai 201804,China);(Tongji Branch, National Engineering & Technology Center of High PerLormance Computers,Shanghai 201804,China)
Abstract:In the virtual computing environment the securing co-operation is based on the trust between the strangers,automated trust negotia-lion provides a mean to establish strangers in distributed situation. However, the current negotialion takes it for granted that the access control policy of negotiation is correct, which will probably has many problems to lead negotiation to fail. This paper emphasized on analyzing the characters of negotiation policy. Firstly, aiming at the inconsistency problems such as inconsistent policy and trivial policy, this paper established a logic proving method based on label binary tree in order to test policy consistency, so as to prove the soundness and completeness of this method.Secondly, this paper gained the minimal credential set by predigesting the policy tree, then successful negotiation was achieved through oncoff discovering the minimal credential set, which will avoid the policy circle and improve the efficiency and the probability of negotiation.
Keywords:Automated trust negotiation  Access control policy  Consistency  Policy circle
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号