共查询到20条相似文献,搜索用时 93 毫秒
1.
2.
3.
多信任域间的安全访问是一项重要的研究内容。结合基于角色访问控制机制(RBAC)的优势及现有的跨域认证技术构建了一种适用于大规模分布式网络环境的跨信任域授权管理CTDPM(Crossing the Trusted-domain Privilege Management)模型。模型中提出角色推荐和单向角色映射策略,支持分布式环境下任意两个信任域之间的安全访问。运用集合论和谓词逻辑对CTDPM模型进行了系统的形式化描述,提出了一套合理的授权与安全规则,并进行了特性分析,最后给出该模型在访问控制系统中的安全应用。 相似文献
4.
5.
6.
7.
网格环境的一种跨域信任模型 总被引:1,自引:0,他引:1
针对跨域资源调度中不同信任模型之间的差异,提出了一个由域间代理完成的不同信任机制之间的转换模型,将跨域和域内信任一致处理,实现了跨域信任度的转换和评估。给出了跨域信任中的上下文定义,提出了实现跨域调度并体现上下文含义的调度算法。实验表明,所提出的转换模型和调度算法在跨域范围内选择了信任度高的资源,缩短了任务完成时间,提高了任务满足率,使调度过程得到了优化。 相似文献
8.
针对跨域资源调度过程中不同域之间信任度评价差异,域与域之间实体信任度无法比较的现象,提出了一个域间信任度计算模型,并由域代理完成不同信任机制的相互转换。通过对不同域之间资源调度历史记录以及推荐信任度进行综合评价,把域间信任度进行规范化,使域之间的信任度有了可比性;给出了跨域信任体系结构;提出了实现跨域调度的算法。实验表明,提出的信任模型和调度算法在跨域范围内选择了信任度高的资源,提高了任务满足率和调度成功率。 相似文献
9.
10.
在分析XCAML和WS—Security安全规范的基础上,设计出一种基于信任的跨域安全认证模型TB—WSCDSA。该模型解决了跨域服务双方身份认证的问题,并依据各自安全域的访问控制策略和信任计算所需的数据和算法,计算双方的信任度,根据信任度阈值比较结果对双方进行信任评估和授权,并将结果以信任证书的方式发送给服务双方以保证安全通信。 相似文献
11.
《International journal of human-computer studies》2006,64(8):697-713
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper, we present a framework for understanding trust factors in web-based health advice. The framework is derived from a staged model of trust and allows predictions to be made concerning user engagement with different health websites. The framework is then validated via a series of qualitative, longitudinal studies. In each study, genuine consumers searched online for information and advice concerning their specific health issue. They engaged in free searching and were directed towards sites previously reviewed using the framework. Thematic analysis of the group discussions provided support for the framework and for the staged model of trust wherein design appeal predicted rejection (mistrust) and credibility of information and personalization of content predicted selection (trust) of advice sites. The results are discussed in terms of the merits of the framework, its limitations and directions for future work. 相似文献
12.
无线传感器网络中的信任管理 总被引:20,自引:0,他引:20
作为对基于密码体系的安全手段的重要补充,信任管理在解决WSNSs(wireless sensor networks)中的内部攻击,识别恶意节点、自私节点及低竞争力节点,提高系统安全性、可靠性和公平性等方面有着显著优势.综述了WSNs环境下信任管理的特点、分类方法、框架设计、脆弱性分析、攻击模型及对策,在此基础上介绍了WSNs下的典型信任管理系统.以信任计算模型为中心的WSNs环境下信任管理框架的设计是信任管理系统的核心,从信任要素、信任计算模型和信任值的应用这3个方面对其进行了深入讨论.最后,总结了WSNs环境下信任管理的研究现状,提出了值得参考的研究发展方向. 相似文献
13.
Trust negotiation is an approach to access control whereby access is granted based on trust established in a negotiation between the service requester and the service provider. Trust negotiation systems avoid several problems facing traditional access control models such as DAC (discretionary access control) and MAC (mandatory access control). Another problem is that Web service providers often do not know requesters identities in advance because of the ubiquitousness of services. We describe Trust-Serv, a trust negotiation framework for Web services, which features a policy language based on state machines. It is supported by lifecycle management and automated runtime enforcement tools. Credential retrieval and validation in Trust-Serv rely on predefined Web services that provide interactions with attribute assertion authorities and public key infrastructure. 相似文献
14.
Internet-based Web application systems are gradually built as software service coordination systems. In an open, dynamic and collaborative application environment, traditional methods assumed with closeness, centralization and independence are not able to cope with these security problems efficiently. Trust management is a new method for dealing with security issues of open, distributed network application system. However, the traditional policy-based trust management systems have some shortcomings, i.e. complex in policy making, unable to deal with negative se-curity credentials, etc. So, we design a trust management framework in combination with subjective trust model for software service coordination and security decision in Internet environment. This trust management framework has characteristics of operability, reasonability, and flexibility in policy setting. 相似文献
15.
孙怀江 《计算机工程与应用》2004,40(29):135-138
信任管理是解决开放多agent系统安全性问题最有前途的思路,而其基础之一就是信任获取。该文在Demp-ster-Shafer证据理论框架内,提出了一种新的证据获取方法,文章认为agent之间一次交互的服务质量提供了关于服务提供者可信任程度的一个证据,多次的服务提供了多个独立的证据,这些证据的合成构成了更准确的证据信任评价。与目前常用的多次服务质量直方图加门限的信任获取方法相比,该方法具有评价结果对门限参数敏感度低,以及对个别a-gent之间交互次数要求少的优点。 相似文献
16.
本文提出一个通用的,并可以独立使用的动态分布式信任模型(DDTM)。在DDTM中,访问权限直接与信任值相关联。信任值又具体分为直接信任值、间接信任值和信任授权等级。文中已经计算并将每一类型的信任价值用明确的数字形式表示。这个模型的核心是基于推荐的信任模型,被组织成信任授权树(TDT),并以证书链的形式进行授权。 相似文献
17.
Disseminating trust information in wearable communities 总被引:1,自引:0,他引:1
Jay Schneider Gerd Kortuem Joe Jager Steve Fickas Zary Segall 《Personal and Ubiquitous Computing》2000,4(4):245-248
This paper describes a framework for managing and distributing trust information in a community of mobile and wearable computer
users. Trust information in the form of reputations are used to aid users during their social interactions with the rest of
the community. 相似文献
18.
We envision highly mobile users cooperating by sharing telecommunication connections to support a continuous messaging notification channel. Peer-to-peer sharing would enable a reduction of users’ telecommunication charges and devices’ battery consumption. Nevertheless, without a centralized trust authority, people lack the incentive to cooperate with a group of strangers. We present a new distributed trust framework and a credit system to solve this problem. Trust is evaluated based on a user’s own experience and information obtained from others. The credit system is built on top of the trust system to ensure that each user appropriately takes turns providing the proxy service for the group of peers. No centralized authority or long-term accountability is needed. Simulation results demonstrate that this framework is stable and efficient. Fairness is maintained among users and each user may benefit in proportion to its contribution to the group. 相似文献
19.
信任模型是整个网络安全体系的基础,决定了在网络上采用信任的形式与采用该形式带来的信任风险,并提供了建立和管理信任关系的框架。可见,对于信任模型的研究在网络安全中非常重要。文章着重分析了基于PKI的各类信任模型的信任机制、认证过程及其存在优缺点,指出了各类信任模型对网络信息安全产生影响的主要原因。通过总结与对比,指出了PKI信任模型的设计策略与发展趋势。 相似文献
20.
Trust and conflict within virtual inter-organizational alliances: a framework for facilitating knowledge sharing 总被引:4,自引:0,他引:4
Trust and conflict are inherent issues of any organizational arrangement and central for knowledge sharing; yet they have received limited attention in the literature. In this paper, we undertake an investigation of both phenomena within the context of virtual alliances. A generic framework for understanding the dynamics of trust and conflict within the context of virtual inter-organizational arrangements is presented, followed by an examination of three distinct structural forms of virtual alliances, and strategies for generating trust and minimizing dysfunctional conflict. The paper concludes with an identification of avenues for further research. 相似文献