Skip to main content

Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment

  • Conference paper
Network Computing and Information Security (NCIS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 345))

Included in the following conference series:

  • 1344 Accesses

Abstract

Trusted system will be an important trend of the research in the field of security. The new architecture of trusted model is proposed for open network, which describes the trust-building processes from many ways. Fine-grain trusted storage structures are designed based on interaction ability and honesty capability, which are based on n history windows. On this condition, trusted transitivity tree based on honesty is studied, which enhances the rationality of the model. Then trusted path-searching policy is presented, which is based on depth-first traversal. Experimental results show that new trusted models conform to the social communication relations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haiyan, W., Ruchuan, W.: CPK-based grid authentication: a step forward. The Journal of China Universities of Posts and Telecommunications 14(1), 26–31 (2007)

    Article  Google Scholar 

  2. Jiangang, C., Ruchuan, W., Haiyan, W.: The extended RBAC model based on grid computing. The Journal of China Universities of Posts and Telecommunications 13(3), 93–97 (2006)

    Article  Google Scholar 

  3. Yong, D., Jiangang, C., Ruchuan, W., Lin, Z.: Authorization delegation mechanism based trust level in grid computing. Journal on Communications 29(9), 10–17 (2008)

    Google Scholar 

  4. Edward, W.: Understanding trusted computing:Will its benefits outweigh its drawbacks? IEEE Security & Privacy 1(3), 60–62 (2003)

    Article  Google Scholar 

  5. Zhuying, L., Xiaojie, L., Lin, L., Lei, S., Gang, X.: Security model research based on trusted computing in ad hoc network. China Communications 7, 1–10 (2011)

    Google Scholar 

  6. Junfeng, T., Ye, Z.: Trust shell based constitution model of trusted software. China Communications 7, 11–22 (2011)

    Google Scholar 

  7. Yuxing, S., Songhua, H., Lijun, C.: Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks. Journal of Software 20(9), 2574–2586 (2009)

    Article  Google Scholar 

  8. Yu, B., Munindar, P.: An evidential model of distributed reputation management. In: AAMAS 2002, pp. 15–19 (2002)

    Google Scholar 

  9. Lin, Z., Ruchuan, W., Haiyan, W.: Trusted decision mechanism based on fuzzy logic for open network. Journal of Computers 3(12), 76–83 (2008)

    Google Scholar 

  10. Souxin, W., Li, Z., Hesong, L.: Evaluation approach of subjective trust based on cloud model. Journal of Software 21(6), 1341–1352 (2010)

    Article  Google Scholar 

  11. Chuang, L., Xuhai, P.: Research on trustworthy networks. Chinese Journal of Computers 28(5), 751–758 (2005)

    Google Scholar 

  12. Mehmet, S.: Security Meter: A Practical Decision-Tree Model to Quantify Risk. IEEE Security & Privacy, 14–24 (2005)

    Google Scholar 

  13. Schechter, S.E.: Toward Econometric Models of the Security Risk from Remote Attacks. IEEE Security & Privacy, 40–44 (2005)

    Google Scholar 

  14. Xiaoyong, L., Xiaolin, G.: Cognitive model of dynamic trust forecasting. Journal of Software 21(1), 163–176 (2010)

    Article  Google Scholar 

  15. Xiaoyong, L., Xiaolin, G., Juan, Z., Dapeng, F.: Novel Scalable Aggregation Algorithm of Feedback Trust Information. Journal of Xi’an Jiaotong University 41(8), 879–883 (2007)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, L., Wang, R. (2012). Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment. In: Lei, J., Wang, F.L., Li, M., Luo, Y. (eds) Network Computing and Information Security. NCIS 2012. Communications in Computer and Information Science, vol 345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35211-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35211-9_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35210-2

  • Online ISBN: 978-3-642-35211-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics