检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:李开[1] 卢正鼎[1] 李瑞轩[1] 刘百灵[1]
机构地区:[1]华中科技大学计算机科学与技术学院,武汉430074
出 处:《计算机科学》2010年第8期67-71,98,共6页Computer Science
基 金:国家自然科学基金项目(60773191;70771043);国家高技术研究发展计划(863计划)项目(2007AA01Z403)资助
摘 要:自动信任协商主要解决跨安全域的信任建立问题,使陌生实体通过反复的、双向的访问控制策略和数字证书的相互披露而逐步建立信任关系。由于信任建立的方式独特和应用环境复杂,自动信任协商面临多方面的安全威胁,针对协商的攻击大多超出常规防范措施所保护的范围,因此有必要对自动信任协商中的攻击手段进行专门分析。按攻击特点对自动信任协商中存在的各种攻击方式进行分类,并介绍了相应的防御措施,总结了当前研究工作的不足,对未来的研究进行了展望。The purpose of Automated Trust Negotiation (ATN) is mainly to establish trust among different security domains. ATN is an approach to establish mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing access control policies and digital credentials. Special attacks can be initiated to ATN according to the characteristics of the way of trust establishment, which cannot be effectively tackled by the measures preventing normal network attacks. Therefore, it is essential to analyze all kinds of attacks existing in ATN. A comprehensive survey of research on attacks in ATN was presented based on the classification and introduction of different attacking manners and corresponding defenses, the shortcomings of the current related research were pointed out and the development trend was also discussed.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.7