共查询到20条相似文献,搜索用时 156 毫秒
1.
可信计算组织TCG针对不符合可信网络接入策略要求终端的处理问题提出隔离补救的概念,实现终端和网络的可信增强,但在实现模型和运行机制方面的研究还有待完善和加强。提出基于可信度的网络接入补救机制,首先通过可信度计算实现终端的可信程度量化分析,然后进行相应的补救处理操作,最后通过实验分析证明该机制能有效实现终端的隔离与补救,在保证安全性的同时增强了网络的易用性。 相似文献
2.
3.
4.
计算平台接入网络时的可信状态对网络安全具有重要的影响,为此可信计算组织TCG提出了TNC架构用以解决计算平台的可信接入问题,该架构提出了可信接入的模型和基本方法,已成为业界的研究热点.通过研究基于TNC架构的可信接入控制技术,实现了具有可信接入控制功能的可信交换机,并给出了可信接入控制应用解决方案,表明基于TNC的可信接入控制技术可以有效地从网络入口处防止非法或不可信终端给网络带来的潜在安全威胁. 相似文献
5.
6.
7.
8.
9.
10.
为了使节点在网络中存在恶意节点和自私节点时能够选择安全可靠的路由,降低恶意节点和自私节点对无线Mesh网络带来的影响,文中通过对无线Mesh网络混合路由协议HWMP(Hybrid Wireless Mesh Protocol)和信任模型的研究,提出了基于主观逻辑信任模型的无线Mesh网络可信路由协议THWMP(Trusted HWMP),大大降低了因为信任的传递带来的网络开销,同时保证了路由的可信度。与HWMP路由协议相比较,在网络中存在恶意节点时,THWMP路由协议能够在增加有限的额外开销的情况下保证全网有较高的数据传递成功率和吞吐量。 相似文献
11.
12.
Cognitive Wireless Mesh Networks (CWMN) is a novel wireless network which combines the advantage of Cognitive Radio (CR) and
wireless mesh networks. CWMN can realize seamless integration of heterogeneous wireless networks and achieve better radio
resource utilization. However, it is particularly vulnerable due to its features of open medium, dynamic spectrum, dynamic
topology, and multi-top routing, etc.. Being a dynamic positive security strategy, intrusion detection can provide powerful safeguard to CWMN. In this paper, we
introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.
Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calculating
trust degree is given based on distributed detection of attack to networks. A channel assignment and routing scheme is proposed,
in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor
nodes to establish a trusted route. Simulation results indicate that the scheme can vary channel allocation and routing dynamically
according to network security state so as to avoid suspect nodes and unsafe channels, and improve the packet safe delivery
fraction effectively. 相似文献
13.
14.
一种基于实体上下文和时间戳的信任预测模型 总被引:1,自引:0,他引:1
信任是网络计算模式下实体交互与协同的基础,如何准确地定量表示和评估信任是研究重点。该文提出以实体上下文和时间戳为条件的信任预测模型,建立了粒度为8的信任等级空间,引入了多维测量指标度量实体交互满意度,使得满意度计算更加精确。构建了具有时间衰减性的直接信任求解方法,克服了已有模型动态适应能力不足的问题。把推荐信任划分为直接推荐和间接推荐,在直接推荐信任求解中引入实体评分相似度因子,在间接推荐信任计算中提出了基于路径衰减的方法。提出了一种分布式树型存储机制DST(Distributed Storage Tree),提高了模型的稳定性和可扩展性。模拟实验表明,与已有同类型模型相比,该模型更有效和准确地提供决策依据,并且在抑制恶意实体方面具有明显作用。 相似文献
15.
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 相似文献
16.
In order to construct the trusted network and realize the trust of network behavior, a new multi-dimensional behavior measurement model based on prediction and control is presented. By using behavior predictive equation, individual similarity function, group similarity function, direct trust assessment function, and generalized predictive control, this model can guarantee the trust of an end user and users in its network. Compared with traditional measurement model, the model considers different characteristics of various networks. The trusted measurement policies established according to different network environments have better adaptability. By constructing trusted group, the threats to trusted group will be reduced greatly. Utilizing trusted group to restrict individuals in network can ensure the fault tolerance of trustworthiness of trusted individuals and group. The simulation shows that this scheme can support behavior measurement more efficiently than traditional ones and the model resists viruses and Trojans more efficiently than older ones. 相似文献
17.
模糊自主信任建立策略的研究 总被引:3,自引:0,他引:3
该文首先从分析开放式网络环境中有关信任的问题和主观信任的模糊性入手,以模糊理论为基础,引入隶属度来描述信任的模糊性,解决了模糊信任模型的建模问题;以图论为基础,将网络环境模型化为一个无向图 ,定义了基于本地信息交互的信任评价规则;提出了基于开放式网络环境的模糊自主信任模型,具体研究了自主信任建立策略及建立完全可信网络的实现机制及条件;最后通过仿真实验讨论了网络拓扑结构对自主信任建立的影响,并以小世界网络模型(-model)为基础分析讨论了自主信任建立的速度问题,这为网络管理的研究提供了一个有价值的新思路。 相似文献
18.
为了发现软件的脆弱点,通过动态监测行为,对软件及其模块在一段时间内运行的可信状况进行研究,提出了基于马尔可夫的检查点可信评估模型。模型通过在软件行为轨迹中织入若干检查点来反映软件运行的行为表现,然后对检查点可信程度进行等级划分,通过马尔可夫模型及检查点权重反映检查点可信情况,最后综合每个检查点的可信情况得到软件整体的可信性。实验结果表明该模型能够有效反映软件中各部分可信情况,验证了模型的合理性和有效性。 相似文献
19.
为有效解决传统推荐算法精度低的问题,提出了一种融合用户偏好和社交活跃度的概率矩阵分解推荐算法(Probabilistic Matrix Factorization Recommendation Algorithm Combining User Prefer-ence and Social Activity,UPSA-PMF),通过用户评分数据计算用户间的偏好信任度时,使用了共同项目平衡因子和热门项目惩罚因子进行改进;计算社交网络中的信任度时,考虑了社交活跃度与用户信任度的关系,并将社交活跃度作为惩罚因子,修正用户信任度.将偏好信任度和社交网络中的信任度以动态组合的方式得到最终的信任度,将最终的信任度与概率矩阵模型相结合,实现推荐.实验证明,改进的算法均优于现有的推荐算法,有效提高了推荐质量. 相似文献
20.
基于全局信任度的多层分组P2P信任模型 总被引:3,自引:0,他引:3
通过多层分组策略,利用组中信任度、全局信任度和个人评价制度,提出基于全局信任度模型的新算法。对于对等节点的每一次P2P连接,算法会在交互前对每个可能交互的信任度进行合理评价,使节点事先得知交互的信任度参考值,可以由此采取相应策略提高交互安全性。经过算法分析和仿真测试表明,该模型的全局信任度具有迭代收敛性,对交互的信任度评价可信度高,对P2P安全性上存在的问题具有较大的改进。 相似文献