Credential trustworthiness-based trust evaluation in grid

被引:0
|
作者
Qu, XL [1 ]
Yang, XJ
Xiang, G
Zhou, HF
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha 410073, Peoples R China
[2] Northeastern Univ, Inst Comp Software & Theory, Shenyang 110004, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Currently, credentials are widely used in attribute/property-based trust establishment. Yet, for the scale and openness of Grid, much uncertainty comes with credentials, such as no globally accepted authority, no guarantee of the consistency between behaviors and claims etc., which is less studied by most credential-based approaches for trust establishment. In this paper we introduce the notion of credential trustworthiness to bring credentials' uncertainty and differentiation to the surface. Using uncertainty-reasoning methods, we give the evaluation of an entity's trustworthiness with one single credential involved and multiple credentials involved respectively.
引用
收藏
页码:554 / 560
页数:7
相关论文
共 50 条
  • [1] Trustworthiness-based dynamic access control for grid application
    Chen, Xu-Ri
    Xu, Wei-Min
    Shen, Wen-Feng
    [J]. Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2008, 35 (07): : 85 - 89
  • [2] Research on Trustworthiness-Based Grid Resource Selection Optimized Algorithm
    Xu Shun-fu
    Wang Bing
    Zhang Xue-jie
    Zheng Shi-ming
    Shao Rong-ming
    [J]. PROCEEDINGS OF THE 2011 INTERNATIONAL CONFERENCE ON INFORMATICS, CYBERNETICS, AND COMPUTER ENGINEERING (ICCE2011), VOL 1: INTELLIGENT CONTROL AND NETWORK COMMUNICATION, 2011, 110 (01): : 627 - +
  • [3] A New Trust Model for Trustworthiness-based Routing Protocols in Sensor Networks
    Yu, Ming
    Liu, Wei
    Xing, Tian
    [J]. 2012 19TH INTERNATIONAL CONFERENCE MECHATRONICS AND MACHINE VISION IN PRACTICE (M2VIP), 2012, : 56 - 61
  • [4] Research on Trustworthiness-based Grid Resource Selection Optimized Algorithm
    Xu Shun-fu
    Wang Bing
    Zhang Xue-jie
    Zheng Shi-ming
    Shao Rong-ming
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 589 - 592
  • [5] Trustworthiness-based Group Communication Protocols
    Kouno, Kazuaki
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014), 2014, : 488 - 492
  • [6] Trustworthiness-based Broadcast Protocols in Wireless Networks
    Sugino, Miyu
    Nakamura, Shigenari
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING IMIS 2015, 2015, : 125 - 132
  • [7] A Trustworthiness-Based Distribution Model for Data Leakage Prevention
    YIN Fan1
    2. College of Computer Science
    3. Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education
    [J]. Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 205 - 209
  • [8] AT-RBAC:: An authentication trustworthiness-based RBAC model
    Wang, LW
    Wei, LF
    Liao, XK
    Wang, HM
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 343 - 350
  • [9] A Trustworthiness-Based QoS Routing Protocol for Wireless Ad Hoc Networks
    Yu, Ming
    Leung, Kin K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (04) : 1888 - 1898
  • [10] A Trustworthiness-based Ad-hoc Routing Protocol in Wireless Networks
    Ogawa, Emi
    Nakamura, Shigenari
    Takizawa, Makoto
    [J]. 2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 1162 - 1168