Font Size: a A A

Research Of Trust Relationship In Multi-Domain Access Control

Posted on:2011-01-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhangFull Text:PDF
GTID:2178330338478272Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Nowadays, with the rapid development of internet and information technology, the number of data and information is exponentially increasing. In order to share resource between computer and computer, most of them adopt distributed structure. Distributed access can provide an efficient method to the resource's efficient use and distribute reasonable. The characteristic of internet is distributed, uncertain, isomerism and dynamic. So, to every user, in this situation: they don't know who they are,it will take a risk that they ask for a requirement of cooperating with others . Because the user may be a good user, also may be a malicious user. These make secure access become more important. In early times, access control technology can assure legal users take a usual access, prevent illegal users take an unauthorized access, even protect the secure problem which caused by legal users'mistake.Secure problem has become a main direction of distributed access research. And the trust is the core of secure problem .In order to solve the distributed multi-domain environment of trust, adopting the method of trust management, the trust proposed by hierarchical management model. Analysis of distributed multi-domain environment of trust models, discussion of calculations of trust and trust update mechanism in models. Trust calculation is the biggest problem, because of the dynamics of trust. Analysis each model's advantages and weakness, different application environments choose suitable model for later practical application laying the groundwork.In distributed environment, the access between entity and entity is a character. The storage and collection of certificates is a critical problem to solve, because the trust certificates is distributed .The previous models put certificates into the resource server. This will enforce the load of it. Proposes a method, the models put the certificates into the clients. This can alleviate the load of resource server. In computing trust, use a trust vector to represent the interaction with the end result. In calculating the final trust, adding the time factor to weighted .At last, synthetic analysis three kinds of Trust degree based certificates chain discovery algorithm: forward, backward, bidirectional and give out these algorithms.
Keywords/Search Tags:multi-domain, access control, trust management, trust, certificates, certificates chains discovery
PDF Full Text Request
Related items