首页 | 本学科首页   官方微博 | 高级检索  
     检索      

网格计算环境中的安全信任协商系统
引用本文:张荣清,李建欣,怀进鹏.网格计算环境中的安全信任协商系统[J].北京航空航天大学学报,2006,32(3):347-351.
作者姓名:张荣清  李建欣  怀进鹏
作者单位:北京航空航天大学 计算机学院, 北京 100083
摘    要:网格技术促进了广域网络环境下的资源共享和协同工作.然而,在网格环境中,服务的提供方和请求方往往位于不同的安全域,如何为位于不同安全区域的陌生主体间动态地建立信任关系成为一项应用难题.基于信任管理基础设施,通过协作主体间信任证、访问控制策略的交互披露逐渐为各方建立信任关系,设计并实现了一个保护协商方隐私信息的安全信任协商系统.该系统采用一种基于属性的委托授权信任证、访问控制策略及一致性验证算法,实现策略的动态调整,从而生成满足访问控制策略的所有最小可满足信任证集,能够使理论上存在的信任关系得以自动建立.通过在CROWN平台中的应用,显示该系统能够满足网格应用中信任自动建立和敏感信息保护的需求. 

关 键 词:网络    信任管理    信任协商    一致性验证器    协商策略
文章编号:1001-5965(2006)03-0347-05
收稿时间:2005-06-24
修稿时间:2005年6月24日

Secure trust negotiation system for grid computing
Zhang Rongqing,Li Jianxin,Huai Jinpeng.Secure trust negotiation system for grid computing[J].Journal of Beijing University of Aeronautics and Astronautics,2006,32(3):347-351.
Authors:Zhang Rongqing  Li Jianxin  Huai Jinpeng
Institution:School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
Abstract:Grid technology promotes resource sharing and collaboration over wide area network.However,service providers and requestors are always located in different secure domains in grid environment.How to establish trust between strangers without prior relationship has become a pressing problem.A system named secure trust negotiation system was designed and implemented,which depends on the trust management infrastructure,establishes trust between strangers with iterative disclosure of credentials and access control policies and can protect participants' private information.A sort of attributed-based authorization credential and access control policy was adopted.A novel algorithm for compliance checker of credentials and access policies was carefully designed,which can be used to generate all the minimal satisfied sets of credentials,so that the trust relationship exsited in theory can be established automatically.During the process of trust negotiation using this system,secure transmission of credentials disclosed was ensured by other subsystems of CROWN.Through the application in CROWN grid,it shows contributions to the automated trust establishment and privacy protection.
Keywords:network  trust management  trust negotiation  compliance checker  negotiation strategy
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《北京航空航天大学学报》浏览原始摘要信息
点击此处可从《北京航空航天大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号