期刊文献+

一种基于Keynote信任管理系统的主动组播组控制机制研究 被引量:1

A RESEARCH ON THE ACTIVE MULTICAST CONTROL MECHANISM BASED ON KEYNOTE TRUST MANAGEMENT SYSTEM
在线阅读 下载PDF
导出
摘要 多播作为一种能够有效利用网络带宽、提高通信效率的通信机制,正在广泛地被应用于多个领域。传统组播缺乏细粒度的访问控制机制,这给组播的安全及性能带来许多隐患。本文在主动组播的基础上提出一种基于信任管理的访问控制机制,并在此基础上给出了Keynote信任管理系统在安全主动组播中的应用构架。该构架能较好解决传统IP组播中未能解决的组播组成员的访问控制与分布式授权问题,从而提高了IP组播的安全性。 As an effective net wide and a mechanism which improves communication capacity, multicast now is being applied in many fields. However, traditional muhicast lacks the detailed filter precision in visit control mechanism, which brings safety problems to muhicast. Thus, on the base of active muhicast, this thesis proposes a visit control mechanism that is founded on trust management, and suggests the application structure of Keynote trust management system in active multicast. This structure can solve the problem, which exists in multicast members' visit control and delivering authorization of traditional IP multicast.
出处 《计算机应用与软件》 CSCD 北大核心 2006年第8期22-23,56,共3页 Computer Applications and Software
基金 国家自然科学基金(60363001) 云南省教育厅科学研究基金(04Y177D)。
关键词 信任管理 Keynote信任管理系统 主动组播 组播组管理 Trust management Keynote trust management system Active muhicast Muhicast group management
  • 相关文献

参考文献11

  • 1Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy,IEEE Computer Society Press, 1996-05:164 - 173.
  • 2Blaze M. The KeyNote Trust Management System(Version2) RFC2704:http://www.crypto. com/papers/rfc2704. txt, 1999.
  • 3D. Wetherall et al, ANTS: A toolkit for building and dynamically depoloying network protocols, Proc. IEEE OpenArch'98, San Francisco,CA, April 1998.
  • 4D. Wetherall, Developing Network Protocols with the ANTS Toolkit,http ://www. sds. lcs. mit/activeware.
  • 5Varadarajan S K, Qian T. Dynamic, Distributed, Secure Multieast in Active Networks. http://choices.cs. uiuc. edu/Security/seraphim/Reports/ice2000. ps. gz.
  • 6Angelos Keromytis, Kostas Anagnostakis…Managing Access Control in Large Scale Heterogeneous Networks http ://www. cis. upenn.edu/-sotiris/papers/insc03.ps.
  • 7陈晓林,杨昌,陆桑璐,陈贵海,谢立.一个主动组播路由协议的设计与实现[J].计算机工程与应用,2004,40(29):76-77. 被引量:6
  • 8陈晓林,李冀,魏明亮,陆桑璐,陈贵海,谢立.一个基于主动网络的大规模可靠组播协议的设计和实现[J].电子学报,2001,29(8):1038-1041. 被引量:4
  • 9徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064. 被引量:113
  • 10王惠芳,郭中,郭金庚,黄永忠,陈海勇.开放分布式系统中的信任管理[J].计算机工程,2004,30(8):117-119. 被引量:7

二级参考文献45

  • 1[1]Abadi M, Burrows M, Lampson B,et al. Calculus for Access Control in Distributed Systems. Transactions on Programming Languages and Systems, 1993,15(4):706-734
  • 2[2]Blaze M, Feigenbaum J, Lacy J. Decentralized Trust Management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy,IEEE Computer Society Press, 1996-05:164-173
  • 3[3]Blaze M. The KeyNote Trust Management System (Version 2).RFC2704:http://www.crypto. com/papers/r fc2704.txt, 1999
  • 4[4]Ellison C, Frantz B, Lampson B. SPKI Certificate Theory. IETF, RFC:2693, 1999-09
  • 5[5]Chu Y H.REFEREE: Trust Management for Web Applications. AT&T Research Labs, http://www.research.att. com/~jf/pubs/www6-97.html,1997
  • 6[6]Ronald L. Rivest and Butler Lampson. SDSI- A Simple Distributed Security Infrastructure. http://theory.lcs.mit.edu/'rivest/sdsil I.html,1996-10
  • 7S Deering,D Estrin ,D Farinacci et al.Protocol Independent Multicast Dense Mode Specification[S].Internet-Draft:draft-ieff-pim-v2-dm-01.txt, 1998-11
  • 8A Ballardie. Core Based Trees(CBT)Multicast Routing Architecture[S].Internet Request for Comment 2201,1997-09
  • 9D Estrin,D Farinacci,A Helmy et al.Protocol Independent MulticastSparse Mode(PIM-SM):Protocol Specification[S].Intemet Request for Comment 2362,1998-06
  • 10D L Tenenhouse ,D Wetherall.Towards an Active Network Architecture[C].In:Proc of the Multimedia Comp and Networking 96,MMCN'96 ,San Jose ,CA, 1996-01

共引文献121

同被引文献9

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部