Abstract
Trusted system will be an important trend of the research in the field of security. The new architecture of trusted model is proposed for open network, which describes the trust-building processes from many ways. Fine-grain trusted storage structures are designed based on interaction ability and honesty capability, which are based on n history windows. On this condition, trusted transitivity tree based on honesty is studied, which enhances the rationality of the model. Then trusted path-searching policy is presented, which is based on depth-first traversal. Experimental results show that new trusted models conform to the social communication relations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Haiyan, W., Ruchuan, W.: CPK-based grid authentication: a step forward. The Journal of China Universities of Posts and Telecommunications 14(1), 26–31 (2007)
Jiangang, C., Ruchuan, W., Haiyan, W.: The extended RBAC model based on grid computing. The Journal of China Universities of Posts and Telecommunications 13(3), 93–97 (2006)
Yong, D., Jiangang, C., Ruchuan, W., Lin, Z.: Authorization delegation mechanism based trust level in grid computing. Journal on Communications 29(9), 10–17 (2008)
Edward, W.: Understanding trusted computing:Will its benefits outweigh its drawbacks? IEEE Security & Privacy 1(3), 60–62 (2003)
Zhuying, L., Xiaojie, L., Lin, L., Lei, S., Gang, X.: Security model research based on trusted computing in ad hoc network. China Communications 7, 1–10 (2011)
Junfeng, T., Ye, Z.: Trust shell based constitution model of trusted software. China Communications 7, 11–22 (2011)
Yuxing, S., Songhua, H., Lijun, C.: Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks. Journal of Software 20(9), 2574–2586 (2009)
Yu, B., Munindar, P.: An evidential model of distributed reputation management. In: AAMAS 2002, pp. 15–19 (2002)
Lin, Z., Ruchuan, W., Haiyan, W.: Trusted decision mechanism based on fuzzy logic for open network. Journal of Computers 3(12), 76–83 (2008)
Souxin, W., Li, Z., Hesong, L.: Evaluation approach of subjective trust based on cloud model. Journal of Software 21(6), 1341–1352 (2010)
Chuang, L., Xuhai, P.: Research on trustworthy networks. Chinese Journal of Computers 28(5), 751–758 (2005)
Mehmet, S.: Security Meter: A Practical Decision-Tree Model to Quantify Risk. IEEE Security & Privacy, 14–24 (2005)
Schechter, S.E.: Toward Econometric Models of the Security Risk from Remote Attacks. IEEE Security & Privacy, 40–44 (2005)
Xiaoyong, L., Xiaolin, G.: Cognitive model of dynamic trust forecasting. Journal of Software 21(1), 163–176 (2010)
Xiaoyong, L., Xiaolin, G., Juan, Z., Dapeng, F.: Novel Scalable Aggregation Algorithm of Feedback Trust Information. Journal of Xi’an Jiaotong University 41(8), 879–883 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, L., Wang, R. (2012). Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-35211-9_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35210-2
Online ISBN: 978-3-642-35211-9
eBook Packages: Computer ScienceComputer Science (R0)