首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
多安全域环境下的访问控制是域间进行协作必须要解决的问题之一。交互主体间的陌生性以及共享资源的敏感性成为跨域建立信任关系的主要障碍。自动信任协商的提出提供了解决这一问题的新途径,它通过协作主体间信任证和访问控制策略的反复交互披露,在资源的请求者和提供者之间自动地建立起信任关系。在分析现有自动信任协商技术的基础上,针对信任协商中存在的证书敏感属性信息泄露的问题提出了改进的方案。该方案可有选择性地披露信任证的敏感属性,从而达到协商过程中减少敏感信息泄露和提高协商系统抗攻击能力的目的。  相似文献   

2.
邵伟俊  金仑  谢俊元 《计算机工程与设计》2007,28(13):3082-3084,3208
随着电子政务的发展,跨域通信的需求越来越迫切,这种情况下为了保证安全需要陌生主体间能够建立信任连接,这在原有信息交换系统中是无法实现的.为此引入信任协商技术,它是一种在不同领域主体间建立信任连接的新技术,它通过信任证、访问控制策略的交互披露来自动建立信任关系.介绍了原有信息交换系统的缺陷、信任协商技术的基本概念,并对信任协商技术与信息交换系统的结合进行了研究,提出了一种可行的系统实现及其策略算法,从而满足在安全性和扩展性方面的要求.  相似文献   

3.
自动信任协商是通过逐渐请求和披露数字证书在两个陌生实体间建立相互信任的方法。当前对自动信任协商协商策略的研究,往往存在很多问题。文章提出了一种基于期望因子的自动信任协商模型,该模型采用MCD策略,通过分析各信任证书的期望因子,当可能的协商存在时,它能披露和请求最小的信任证找到一条成功的协商路径,当协商不可能成功时,尽快的发现并终止它。它能保证在协商的过程中没有不相关的信任证被披露并且不需要暴露双方的访问控制策略,同时通过实验证了明MCD策略是完备的。  相似文献   

4.
自动信任协商是跨多安全域的实体间建立信任关系的一种新方法,协商策略规定了协商过程中信任凭证和访问控制策略的披露方式。针对目前的研究中没有区分凭证的敏感度的问题,引入凭证权重的概念,设计了一种基于带权重的树的协商策略,采取局部取优的思想,每次在访问控制策略可选的情况下选取最小权重的凭证进行披露,直至协商成功或失败。经证明,该策略安全、完备且高效。  相似文献   

5.
吝啬语义信任协商   总被引:2,自引:0,他引:2  
自动信任协商足通过数字证书的交互披露在陌生实体间建立信任的过程,现有的自动信任协商框架要求主体出示完整属性证书来证明自己满足对方资源披露策略中的身份断言约束条件,导致了属性证书中身份信息过度披露问题.该文中作者提出一种通过交换DL-TNL语义身份断言来建立信任关系的吝啬语义信任协商框架,避免了完整属性证书的直接出示,减少信任建立过程中身份信息被披露的程度,并提出一种正确、完备且有效的吝啬语义信任协商策略.在该策略下,交易双方的协商引擎可以快速有效地从由身份断言权威签发的包含多个DL-TNL语义身份断言的身份断占证书中,自动计算出批露最少信息且符合对方策略的身份断言集进行出示,以最大限度地减少信任建立过程中被披露的身份信息,并保证理论上存在成功可能性时,使用该策略必然可以有效地帮助主体最终获得网络资源的访问权限.有关该策略完备性和正确性的证明以及策略实施中所使用的符合性检测算法的实现和分析均在文中给出.  相似文献   

6.
自动信任协商研究   总被引:39,自引:2,他引:39  
在Internet日益孕育新技术和新应用的同时,交互主体间的生疏性以及共享资源的敏感性成为跨安全域信任建立的屏障.自动信任协商是通过协作主体间信任证、访问控制策略的交互披露,逐渐为各方建立信任关系的过程.系统介绍了这一崭新研究领域的理论研究和应用进展情况,并对信任协商中的协商模型、协商体系结构、访问控制策略规范、信任证描述及发现收集、协商策略及协商协议等多项关键技术的研究现状进行分析和点评,最后针对目前研究工作中存在的一些问题,对未来的研究方向及工作进行展望.通过对自动信任协商的研究及其进展的介绍,希望有助于在维护开放网络中主体自治性和隐私性的同时,研究更高效、实用的信任自动建立技术.  相似文献   

7.
自动信任协商为开放环境中希望进行资源共享或业务协作的陌生双方提供了一种灵活的信任建立方法。然而现有自动信任协商系统之间不具备可互相操作性,首要原因是缺少一个统一的信任协商协议。提出了一种不依赖于协商策略的信任协商协议,将协议消息划分为资源请求、信息披露和终止协商3种类型并定义了消息的格式,阐明了协商过程的3种状态及状态之间的转化关系,同时给出了协议实现算法。分析表明,该协议支持包括多种格式信任证在内的数字断言和不同策略语言描述的访问控制策略的披露,允许在一次协商过程中使用多种协商策略进行协商,以满足不同应用场景的协商需求,因而具有明显的通用性。  相似文献   

8.
一种基于隐藏证书的自动信任协商模型   总被引:1,自引:0,他引:1  
自动信任协商是一种通过逐步暴露证书和访问控制策略以确立协商双方信任关系的安全方法。隐藏证书采用椭圆曲线加密的原理,具有极好的安全保密性与数据完整性。本文将隐藏证书引入到自动信任协商系统中,提出了一种基于隐藏证书的自动信任协商模型(简称为HCBATN)。该模型使用隐藏证书来携带并传递双方交换的证书、访问控制策略、资源等信息,充分保护了证书、策略的敏感信息以及用户个人隐私;同时具有单轮回证书交换、较小的网络开销、较低的证书保存、较高安全保密性等优点。  相似文献   

9.
基于标签树的自动信任协商策略分析   总被引:1,自引:0,他引:1  
夏冬梅  曾国荪  陈波  鲍宇 《计算机科学》2009,36(12):154-157
网络实体间的信任建立是彼此进行安全交互的前提,自动信任协商为分布式环境下陌生实体的信任建立提供了方法.但现有的信任协商默认协商中访问控制策略正确,而策略本身很可能存在某些问题,导致协商失败.重点分析协商策略的性质,首先针对可能存在的冲突策略、平凡策略等策略不一致问题,构建了一种基于标签树的逻辑证明方法,进行策略一致性的检测,并证明了此证明方法的可靠性、完备性;其次,通过对策略树进行化简以求得最小证书集,并对其进行一次性披露和匹配,尽快达成成功协商,从而避免策略环问题,提高协商效率及成功率.  相似文献   

10.
为了解决网格环境下不同管理域中陌生用户之间信任关系的建立问题,对GSI及自动信任协商进行了改进与结合。分析了网格环境的特点以及网格对于信任管理的需求;扩展了GSI中SSL认证协议的功能,增加了密钥协商过程以进行安全通信信道的建立;在自动信任协商中引入角色的概念,提高了资源访问的效率。构建于GSI基础之上的基于角色的自动信任协商模型的提出进一步提高了网格的安全性。  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
蒙古语言是中国蒙古族使用的通用语言,由于蒙古文区别于其他文字的书写方式和其自身变形机制等特点,在很多通用的文字处理引擎中都不被支持。在嵌入式产品开发与应用领域中Linux加QTE已经成为流行方式。该文给出了一种在QTE环境上实现基于标准Unicode的蒙古文点阵显示和变形算法, 并自定义了支持蒙古文的QTE组件,扩展了QTE功能,为在Linux加QTE方式的嵌入式体系结构中处理蒙古文提供了一种解决方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号