用户名: 密码: 验证码:
网格环境中信任模型与访问控制模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
网格被誉为下一代Internet。在分布、异构、开放的网格环境中,用户常常需要面对陌生的合作对象,这大大增加了网格用户利益受到侵害的风险。传统计算机安全的研究内容主要针对外部威胁。然而,庞大的网格系统受到的威胁更多来自系统内部,传统的方法就显得束手无策了。网格系统的内部威胁主要来自网格用户的恶意行为,因此,需要对用户在网格环境下的行为进行评价和预测。信任模型以及在此基础上建立的信誉系统可以监控,刻画网格用户的行为变化,反映出该用户网络行为的可信程度,已经被证明为解决网格环境内部威胁的重要途径之一。本文针对现有网格信任模型及网格信誉系统研究的不足,在网格信任模型刻画信任关系的准确性,敏感性及健壮性等方面进行了深入的研究,提出了新型的网格信任模型,并将其应用到网格虚拟组织构建及网格访问控制模型等领域,取得了良好的效果。
     本论文的主要研究成果如下:
     1)针对服务网格环境下,信誉系统刻画跨组织陌生实体间信任关系的合理性、健壮性及可扩展性等问题,提出了一种健壮的信任模型和相应的可扩展网格信誉系统。该信誉系统依据网格实体间的信任关系,通过在网格组织结构之上建立overlay网络,充分利用该网络图的全局特性,计算推荐信任关系,并将组织间的信任关系作为重要参考,实现了实体信任关系的合理评价,对服务网格环境的资源管理以及网格虚拟组织的构建中合作者的选择都有着良好的指导作用。
     2)提出了基于信誉的可扩展网格虚拟组织新构建方法。该方法通过充分考虑评价者的全局经验来有效地约束不良节点的恶意行为,融合评价对象的客观性能实现半自动信任信息反馈,并且通过合理地参考以往信任评价来准确地评价直接信任关系。通过引入评价者信誉,发现并过滤非诚实推荐,增强系统健壮性。该方法将虚拟组织发起者对未来虚拟组织的愿景以及所需服务类别作为实体间信任评价的重要指标,使得该方法更加适合在充满自治管理域的网格环境中构建虚拟组织。
     3)提出了一种基于信任度的网格虚拟组织访问控制模型TwBAC(Trustworthiness Based Access Control model),该模型能够刻画带有上下文的访问控制策略;对资源实体进行抽象,减轻管理负担;应用信任度刻画虚拟组织成员之间的信任关系,并有效控制委托深度。此外,采用分布式管理模型AdTwBAC实现虚拟组织成员域管理自治。
Grid is regarded as the next generation of Internet. In the distributed, heterogeneous and open grid environment, users often have to face unfamiliar partners. As a result, the risk of the lRss RI users' interests will Ee greatly increaseG Tra(?)tiRnal cRmputer security mainly IRcuses on the intrusion prevention from the outer of systems. eowever, traditional security machnisms did not deal with these threats from the inner of systems, which are also major attacks in grid systems. The internal threats of grid systems are mainly brought by malicious behavious. Therefore, it is necessary for grid systems to pre(?)ct anG evaluate users' EehaviRrs. Trust models and reputation systems, which can reflect the credibility of users through monitoring and describing the change of user behaviors, have been proven to be one of the efficient ways to address the internal threats. crom veracity, sensitivity, scalability and robustness in grid trust models and grid reputation systems, this dissertation proposes several new trust models and their corresponding grid reputation systems, and applies these models into the formation of grid virtual organization and grid access control models.
     The contributions of this dissertation are as follows:
     1) To solve the rationality, robustness and scalability problems in the grid reputation systems, while depicting the trust relationship between the two unacquainted entities in different inter-organizations, a new trust model and its corresponding grid reputation system are proposed. This model constructs a virtual trust overlay network on top of the grid infrastructure using trust relationships between entities, and regards the organization-level trust relationship as a crucial reference factor based on the global property of virtual trust overlay network, which achieves rational trust evaluation between two entities. The system also resists fake transaction attacks and slander attacks efficiently.
     2) A new trust model and its corresponding robust grid reputation system with semiautomatic feedback ratings are proposed, and this model is applied for the formation of grid virtual organization, in which, a fine-grained feedback expression model based on the aggregation of objective n op attributes and subjective opinions of evaluators is proposed to enable a personalized and accurate feedback expression semi-automatically. r sing the punishment factor and the adaptive combination of historic trust values and current feedback, the sensitivity of the reputation evaluation in our reputation systems is increased. Moreover, the concept of recommender reputation is introduced into our solution to filter out dishonest recommendations, thus making the reputation system more robust against collusive attacks.
     3) A trustworthiness-based access control model for virtual organizations, called TwBAC model, is presented. It can express contextual access control policies, and offers the abstraction for resource objects like the roles for subjects. Besides, our model can express the trust relationship of VO members accurately by using trustworthiness, which can also be used to control the depth of delegation. This dissertation also presents an administration model to perform the autonomous management.
引文
[1]Foster I,Kesselman C,Tuecke S.The Anatomy of the Grid:Enabling Scalable Virtual Organizations[J].International Journal of High-Performance Computing Applications,2001,15(3):200-222.
    [2]Christopher Dwan.Perspectives on Grid Computing[EB/OL].November 2003 available online,http://chris.dwan.org/machine/grid.pdf.
    [3]Grid computing新手入门[EB/OL].http://www-128.ibm.com/developerworks/cn/grid/newto/#2
    [4]Foster I.The Grid:A New Infrastructure for 21st Century Science[J].Physics Today,2002,54(2):42-47
    [5]I-WAY Project.http://www.iway.org/
    [6]Foster I,Kesselman C.The Grid:Blueprint for a New Computing Infrastructure[M].Morgan Kaufmann:San Fransisco,CA,1999.
    [7]Smart L and Catlett C.Metacomputing[J].Communications of the ACN,1992,35(6):44-52.
    [8]Foster I and Kesselman C.Globus:A Metacomputing Infrastructure Toolkit[J].International Journal of Supercomputing Applications,1997,11(2):115-128.
    [9]FAFNER,http://www.npac.syr.edu/factoring.html.
    [10]SETI@home.http://setiathome.ssl.berkeley.edu/.
    [11]Distributed.net.http://www.distributed.net/.
    [12]Globus Alliance.http://www.globus.org/.
    [13]Legion.http://legion.virginia.edu.
    [14]网格计算,关键组件是什么?[EB/OL].http://www.ibm.com/developerworks/cn/grid/gr-overview/.
    [15]Ferris C and Farrell J.What are Web services?[J].Communications of the ACM,2003,46(6):58-63.
    [16]Global Grid Forum,GGF[EB/OL].http://www.ggf.org/.
    [17]Foster I,KesselmanC,Nick J and Tuecke S.The Physiology of the Grid:Open Grid Service Architecture for Distributed System Integration[R/OL].Presented at GGF4,Feb 2002.http://www.globus.org/research/papers/ogsa.pdf.
    [18]徐志伟,冯百明,李伟.网格计算技术[M].北京:电子工业出版社,2004.
    [19]马自卫,宋薇等.Internet高级应用技术[M].北京:北京邮电大学出版社,2001.
    [20]都志辉,陈渝,刘鹏.网格计算[M].北京:清华大学出版社,2002.
    [21]Foster I.What is the Grid? A Three Point Checklist[R].GRIDToday,July 20,2002.
    [22]Extensible Markup Language(XML)[S/OL].http://www.w3.org/XML/.
    [23]SOAP[S/OL].http://www.w3.org/TR/soap/.
    [24]Web Service Description Language(WSDL) 1.1[S/OL].http://www.w3.org/TR/wsdl.
    [25]UDDI[S/OL].http://www.uddi.org/.
    [26]Web Services Flow Language(WSFL) Version 1.0[S/OL].http://www-3.ibm.com/software/solations/werbservices/pdf/WSFL.pdf.
    [27]WSRF[S/OL].http://www.globus.org/wsrf/.
    [28]Open Grid Services Architecture,version 1[S/OL].http://www.gridforum.org/documents/GWD-I-E/GFD-I.O30.pdf.
    [29]Foster I,Kesselman C,Tsudik G,and Tuecke S.A Security Architecture for Computational Grids,Proceedings of ACM Conference on Computers and Security[C].ACM Press,New York,1998:83-99.
    [30]Markus Lorch,Dennis Kafura.Grid Community Characteristics and their Relation to Grid Security[R/OL].2003.http://zuni.cs.yr.edu/publications/draft-ggf-lorch-grid-security-version0.pdf.
    [31]徐峰,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002.13(11):2057-2064.
    [32]Beulah Alunkal,Ivana Veljkovic,and Gregor von Laszewski.Reputation-based Grid Resource Selection[C/OL].Proceedings of Workshop on Adaptive Grid Middleware (AGridM 2003),number ANL/MCS-P1109-0903,New Orleans,Louisiana,2003:http://www.iit.edu/~alunbeu/publications/reputation.pdf.
    [33]Marsh Stephen.Formalising trust as a computational concept[D].Scotland:University of Stifling,1994.
    [34]Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.Proceedings of the 17th Symposium on Security and Privacy.Oakland,1996[C].CA:IEEE Computer Society Press,1996:164-173.
    [35]Aifarez Abdui-Rahman,Stephen Halles.A distributed trust model.Proceedings of the 1997 New Security Paradigms Workshop.Cumbria,1997[C].UK:ACM Press,1998:48-60.http://www.ib.hu-berlin.de/~kuhlen/VERT01/abdul-rahman-trust-mode11997,pdf.
    [36]Aifarez Abdui-Rahman,Stephen Halles.Using recommendations for managing trust in distributed systems.Proceedings of the IEEE Malaysia International Conference on Communication' 97(MICC' 97)[C].Kuala Lumpur:IEEE Press,1997.http://citeseer.nj.nec.com/360414.html.
    [37]Yahalom,R,Klein B,and Beth T.Trust relationships in secure systems - a distributed authentication perspective.Preceedings of the 1993 IEEE Symposium on Research in Security and Privacy[C].IEEE Press,1993:50-164.
    [38]Beth T,Borcherding M,Klein B,and Gollmann D.Valuation of trust in open network.Proceedings of the European Symposium on Research in Security(ESORICS)[C].Brighton:Springer-Verlag,1994:3-18.
    [39]Jφsang A,Tran N.Trust Management for E-Commerce[C/OL],2000.http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.9260.
    [40]Grandison T.Trust Management for Internet Applications[D].University of London,2003.
    [41]McKnight D H,Chervany NL.The Meaning of Trust[R].Technical Report MISRC Working Paper Series 96-04,University of Minnesota.Management Information Systems Research Center,1996.
    [42]唐文.基于模糊集合理论的信任管理研究[D].北京大学,2003.
    [43]McKnight D H,Chervany N L.Conceptualizing Trust:A Typology and E-Commerce Customer Relationships Model,Proceedings of 34th Annual Hawaii International Conference on System Sciences[C],2001,7022-7031.
    [44]Diego Gambetta.Can We Trust Trust?.Trust:Making and Breaking Cooperative Relations[M],Department of Sociology,University of Oxford,1988.213- 237.
    [45]Alfarez Abdul-Rahman,Stephen Hailes,Supporting Trust in Virtual Communities,Proceedings of 33rd Hawaii International Conference on System Sciences[C].Maui,Hawaii,2000:6007-6016.
    [46]Farag Azzedin and Muthucumaru Maheswaran,Evolving and managing trust in grid computing systems[C].Proceedings of IEEE Canadian Conference on Electrical&Computer Engineering,2002:1424-1429.
    [47]Marsh S.Formalizing Trust as a Computational Concept[D].University of Stifling,1994.
    [48]Grandison T and Sloman M.A Survey of Trust in Internet Applications[J].IEEE Communications Surveys and Tutorials,2000,3(4):1-30.
    [49]Trust-EC Project.http://dsa-isis.jcr.it/TrustEC.
    [50]Dimitrakos T.System Models,e-Risk and e-Trust.Towards the E-Society[C].Proceedings of IFIP conference on E-Commerce,E-Business and E-Government,Dordrecht:Kluwer Academic Publishers Group,2001.
    [51]Josang.,Ismail R,and Boyd C.A survey of trust and reputation systems for online service provision[J].Decision Support Systems,2007,43(2):618 -644.
    [52]王东安.网格计算中信任模型及其应用研究[D].中国科学院研究生院(计算技术研究所).2006.
    [53]Silaghi G C,Arenas A E,Silva L M.Reputation-based trust management systems and their applicability to grids[R/OL].CoreGRID Technical Report.2007.http://www.coregrid.net/mambo/images/stories/TechnicalReports/tr-0064.pdf.
    [54]Audun Jφsang.A logic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems.2001,9(3):279-311.
    [55]Audun Jφsang.Legal reasoning with subjective logic[J].Artificial Intelligence and Law.2001(8),289-315.
    [56]Audun Jφsang.Conditional Inference in Subjective Logic[C].Proceedings of the 6th International Conference on Information Fusion,2003(1):471-478.
    [57]Jφsang A.Probabilistic Logic under Uncertainty[C].Proceedings of Computing:The Australian Theory Symposium(CATS'07),Ballarat,2007(65).
    [58]KamvarS D,Schlosser M T,Garcia-Molina H.The EigenTrust Algorithm for Reputation Management in P2P Networks[C],Proceedings of the 12th international conference on World Wide Web,ACM Press New York,NY,USA,2003,640-651.
    [59]Jφsang A,Ismail R,and Boyd C.A Survey of Trust and Reputation Systems for Online Service Provision[J].Decision Support Systems,2005,43(2):618-644.
    [60]Farag Azzedin and Muthucumaru Maheswaran.Evolving and Managing Trust in Grid Computing Systems.Proceedings of Canadian Conference on Electrical and Computer Engineering 2002:1424-1429,Canada,May 12-15 2002[C].IEEE Computer Society Press.http://www.cs.mcgill.ca/_anrl/PUBS/ccece2002farag.pdf.
    [61]Resnick P,Zeckhauser R,Friedman E,and Kuwabara K.Reputation Systems[J].Communications of the ACM,2000,43(12):45-48.
    [62]曲向丽:网格环境下互信机制关键技术研究[D].国防科技大学,2007.
    [63]Rasmusson L,Janssen S.Simulated Social Control for Secure Internet Commerce.Proceedings of the 1996 New Security Paradigms Workshop,1996[C].ACMpress,1996.
    [64]Kerschbaum F,Haller J,Karabulut Y,and Robinson P.Pathtrust:A Trust-Based Reputation Service for Virtual Organization Formation[C].Proceedings of 4th International Conference on Trust Management,2006,193-205.
    [65]ITU-T recommendation X.509 IS].http://www.itu.int/rec/T-REC-X.509.
    [66]Phil Zimmermann.PGP User' s Guide[M].MIT Press,Cambridge,1994.
    [67]Dewan P,Dasgupta P.Securing Reputation Data in Peer-to-Peer Networks.Proceedings of International Conference on Parallel and Distributed Computing and Systems(PDCS 2004)[C],MIT Cambridge,USA,November 2004.
    [68]Yu B and Singh M P.An evidential model of distributed reputation management.Proceedings of the first international joint conference on Autonomous agents and multiagent systems,New York,NY,USA,2002[C],ACM Press New York,NY,USA,294-301.
    [69]Damiani E,Vimercati D C D,Paraboschi S.A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks.Proceedings of the 9th ACM conference on Computer and communications security,Washington,DC,USA,2002[C],ACM Press New York,NY,USA,207-216.
    [70]Cornelli F,Damiani E,Capitani di S D,Paraboschi S,Samarati P.Choosing Reputable Servents in a P2P Network.Proceedings of the 11th international conference on World Wide Web table of contents,Honolulu,Hawaii,USA,2002[C],ACM Press,New York,NY,USA,376-386.
    [71]Kinateder M,Rothermel K.Architectureand Algorithms for a Distributed Reputation System.Proceedings of the First International Conference on Trust Management:iTrust'03,Heraklion,Crete,Greece,May 28-30,2003[C].Heidelberg:Springer-Verlag,May 2003,1-16.
    [72]Gupta M,Judge P,Ammar M,A Reputation System for Peer to Peer Networks.Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video Monterey,CA,USA,2003[C],144-152.
    [73]Singh A and Ling Liu.Trustme:Anonymous management of trust relationships in decentralized p2p systems.Proceedings of the 3rd International Conference on Peer-to-Peer Computing,Washington,DC,USA,2003[C],142 - 149.
    [74]Li Xiong and Ling Liu.Peertrust:Supporting reputation-based trust for peer-to-peer electronic communities[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843 - 857.
    [75]Rob Sherwood,Seungjoon L,and Bhattacharjee B.Cooperative peer groups in nice [J].Computer Networks,2006,50(4):523 - 544.
    [76]Aberer K and Despotovic Z.Managing trust in a peer-2-peer information system.In CIKM' 01:Proceedings of the tenth international conference on Information and knowledge management,New York,NY,USA,2001[C].ACM Press,New York,NY,USA,2001,310-317.
    [77]徐锋,吕建.Web安全中的信任管理研究与进展[J].软件学报,2002,13(11):2057-2064.
    [78]Blaze M,Feigenbaum J,Strauss M.Compliance Checking in the PolicyMaker Trust Management System,Proceedings of the Second International Conference on Financial Cryptography table of contents[C].Springer-Verlag London,UK,1998,254-274.
    [79]Blaze M,Feigenbaum J,Keromytis A D.Keynote:trust management for public-key infrastructures.Cambridge 1998 Security Protocols International Workshop[C].Berlin:Springer-Verglag,1999,59-63.
    [80]Chu Y H,Feigenbaum J,LaMacchia B,et al.REFEREE:trust management for Web applications[J].World Wide Web Journal,1997,2(2):127-139.
    [81]Kagal L,Finin T,and Anupam J.Trust-Based Security in Pervasive Computing Environments[J].IEEE Computer,2001,34(12):154- 157.
    [82] Almenarez F, Marin A, Diaz D, and Sanchez J. Developing a Model for Trust Management in Pervasive Devices [C]. Proceedings of Third IEEE International Workshop on Pervasive Computing and Communication Security (PerSec 2006), at Fourth Annual IEEE International Conference on Pervasive Computing and Communications, March 2006.
    [83] Almenarez F, Marin A, Campo C, et al. A Pervasive Trust Management Model for Dynamic Open Environments. Proceedings of the First Workshop on Pervasive Security and Trust at MobiQuitous 2004 [C], Boston, USA.
    
    [84] AlMenarez F, Diaz D, and Marin A. Secure Ad-hoc mBusiness: Enhancing WindowsCE security. Proceedings of 1st Conference on Trust Digital Business (TrustBus' 04), Zaragoza , ESPAGNE ,2004 [C]. Springer, Berlin, ALLEMAGNE, 2004, 90-99.
    
    [85] Jameel H, Hung L X, Kalim U, et al. A Trust Model for Ubiquitous Systems based on Vectors of Trust Values. Seventh IEEE International Symposium on Multimedia (ISM' 2005), 2005 [C]. IEEE Computer Society Washington, DC, USA, 2005, 674-679.
    
    [86] Buchegger S, Boudec J Y L. A Robust Reputation System for Mobile Ad-hoc Networks [C/OL] EPFL IC IC/2003/50, July 2003.http://www.mics.org/getDoc.php?docid=596&docnum=l.
    
    [87] Paul Resnick. Trust among strangers in internet transactions: empirical analysis of ebay's reputation system [R]. Working Paper for the NBER workshop on empirical studies of electronic commerce, January 2001.
    
    [88] Amazon. http://www.amazon.com.
    
    [89] Epinions. http://www.epinions.com.
    
    [90] Bizrate. http://www.bizrate.com.
    
    [91] 淘宝网. http://www.taobao.com.
    
    [92] 拍拍网. http://www.paipai.com.
    
    [93] Resnick P, Zeckhauser R, Swanson J, and Lockwood K. The value of reputation on ebay: A controlled experiment [J]. Experimental Economics, 2006, 9(2): 79-101.
    
    [94] J(?)sang A. The right type of trust for distributed systems. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead, CA, 1996 [C]. ACM Press, 1996.
    
    [95] J(?)sang A. A model for trust in security systems. Proceedings of the 2nd Nordic Workshop on Secure Computer Systems [C/OL]. 1997.http://security. dstc. edu. au/staff/ajosang/papers. html.
    
    [96] J(?)sang A, Knapskog S J. A metric for trusted systems [J]. Global IT Security. Wien:Austrian Computer Society, 1998: 541-549.
    
    [97] J(?)sang A. A Sujective Metric of Authentication. Proceedings of the ESRICS' 98.Louvain-la-Neuve, 1998 [C]. Springer Verlag, 1998, 329-344.
    [98] J0sang A. An algebra for assessing trust in certification chains. Proceedings of the Network and Distributed System Security Symposium, NDSS 1999, San Diego, California, USA, 1999 [C]. The Internet Society, 1999.
    [99] Wishart R, Robinson R, Indulska J, and J(?)sang A. Superstringrep:reputation-enhanced service discovery. Proceedings of the Twenty-eighth Australasian conference on Computer Science, Darlinghurst, Australia, 2005 [C]. Australian Computer Society, 2005, 49-57.
    [100] Azzedin F, Maheswaran M. Evolving and Managing Trust in Grid Computing Systems.Proceedings of IEEE Canadian Conference on Electrical & Computer Engineering (CCECE'02), TRLabs, Manitoba Univ., Winnipeg, Man., Canada, 2002 [C]. IEEE Computer Society, 1424-1429.
    [101] Azzedin F, Maheswaran M. Integrating Trust into Grid Resource Management Systems.Proceedings of International Conference on Parallel Processing (ICPP 2002),Winnipeg, Manitoba, Canada, 2002 [C]. IEEE Computer Society, 47-54.
    
    [102] Azzedin F, Maheswaran M. Towards Trust-Aware Resource Management in Grid Computing Systems, Proceedings of 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02), 2002 [C]. University of Manitoba, 2002,452-457.
    [103] Hwang K, Song S S, Lv J. GridSec: Grid Security Enforcement with Trust Integration over Minimal VPN Tunnels [R]. USC Technical Report 2004-13, IEEE Computer Magazine,2004.
    [104] Song S S, Hwang K. Security Binding for Trusted Resource Allocation in Computational Grids [R], Report 2004-8, USC Internet and Grid Computing Lab,submitted to IEEE Trans. on Parallel and Distributed Systems, May 2004.
    [105] Hwang K, Tanachaiwiwat S. Trust Models and NetShield Architecture for Securing Grid Computing [J], Journal of Grid Computing, 2003.
    [106] Song S S, Hwang K. Trusted Grid Computing with Security Assurance and Resource Optimization [C], Proceedings of the International Conference on Parallel and Distributed Computing Systems(PDCS-2004), San Francisco, CA, USA. Sept. 15-17, 2004,110-117.
    [107] Laszewski G V, Alunkal B E, and Vel jkovic I. Towards reputable grids [J]. Scalable Computing: Practice and Experience, 2005, 6(3): 95-106.
    [108] Singh M P, Yu B, and Venkatraman M. Community-based service location [J]. Commun.ACM, 2001, 44(4): 49-54.
    
    [109] PPLive 网络电视. http://www.pplive.com.
    [110] Chinagrid. http://www.chinagrid.net.
    
    [111] 唐文.基于模糊集合理论的信任管理研究[D].北京大学, 2003.
    [112]窦文等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,15(4):571-583.
    [113]黄辰林.动态信任关系建模和管理技术研究[D].国防科技大学,2005.
    [114]袁时金.信任管理关键技术研究[D].复旦大学,2004.
    [115]李景涛.P2P环境下的信任模型与副本方案研究[D].复旦大学,2006.
    [116]卢三超.对等网络信任模型的研究[D].西安理工大学,2007.
    [117]田慧蓉.P2P网络信任模型及激励机制的研究[D].北京邮电大学,2006.
    [118]张书钦.对等网络中信任管理研究[D].哈尔滨工程大学,2005.
    [119]蒋兴浩.基于PKI机制的对等网信任管理问题研究[D].浙江大学,2002.
    [120]徐峰.开放协同软件环境中信任管理研究[D],硕士毕业论文,南京大学,2003.
    [121]Fan Hong,Xian Zhu,Shaobin Wang.Delegation Depth Control in Trust-Management System.Proceedings of the 19th International Conference on Advanced Information Networking and Applications(AINA' 05),Tamkang University,Taiwan,2005[C].IEEE Computer Society,2005,411-414.
    [122]姚寒冰.网格环境中访问控制与信任模型研究[D].华中科技大学,2006.
    [123]尹刚.域间计算环境中授权管理研究与实现[D].国防科学技术大学,2006.
    [124]Nasser B,Laborde R,et al.Grid virtual organization:access control management [C].Proceedings of Gres05,Luchon,2005.
    [125]Wooldridge M,Jennings N R.Intelligent agents:Theory and practice[J].Knowledge Engineering,1995,10(2):115-152.
    [126]Jablonski S,Bussler C.Workflow Management Modeling Concepts[J].Architecture and Implementation.London:Thomson Computer Press,1996
    [127]Foster I,Jennings N R,Kesselman C.Brain meets brawn:Why grid and agents need each other[C].Proceedings of the 3rd International Conference on Autonomous Agents and Multi-Agent Systems(AAMAS' 04),New York,USA,2004,8-15.
    [128]Shao J,and Gray W A,et al.Supporting formation and operation of virtual organizations in a grid environment[C].Proceedings of the UK OST e-Science Second All Handa Meeting,Nottingham,UK,2004,376-383.
    [129]MyGrid.http://www.mygrid.org.uk.
    [130]AstroGrid.http://www.astrogrid.org.
    [131]CombeChem.http://www.combechem.org.
    [132]Huaizbi Li,Mukesb Singbal.Trust Management in Distributed Systems[J].Proceedings of IEEE Computer Society.2007,45-53.
    [133]Li Jianxin,Huai Jinpeng,Li xianxian.Research on Automated Trust Negotiation [J].Journal of Software.2006,17(1):124-133.
    [134]Liao zhensong,Jin hai,et al.Automated Trust Noegotiation and Its Development Trend[J].Journal of Software.2006,17(9):1933-1948.
    [135]Shan Baohua,Yang Dongju et al.A Stakeholder-Centric Virtual Organization Model and Its Application in E-Government[J].Chinese Journal of Computers.2006,29(7):1241-1251.
    [136]Freudenthal E,Pesin T,et al.dRBAC:distributed role-based access control for dynamic coalition environments[C].Proceedings of 22nd International Conference on Distributed Computing Systems,2002,411-420.
    [137]Pierangela Samarati,Sabrina de Capitani di Vimercati.Access control:policies,models,and mechanisms[G].Lectrue Notes in Computer Science.2001.
    [138]Sandhu R S,Coyne E J,et al.Role-based access control models[J].IEEE Computer,1996,29,38-47.
    [139]Cohen E,Thomas R K,et al.Models for coalition-based access control[C].Proceedings of the seventh ACM symposium on Access control models and technologies,2002,97-106.
    [140]孙为群,单保华等.一种基于角色代理的服务网格虚拟组织访问控制模型[J].计算机学报.2006,29(7):1199-1208.
    [141]Zhang G,Manish P.Dynamic context-aware access control for grid applications [C].Proceedings of 4th International Workshop on Grid Computing,2003,101-108.
    [142]Kalam A A E,Baida R E,et al.Organization based access control[C].Proceedings of 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY' 03),2003,120-131.
    [143]Xing Guanglin,Hong Fan.A Workflow Authorization Model Based on Role and Task and Constraints Specification[J].Journal of Computer Research and Development.2005,42(11):1946-1953.
    [144]Xu Wei,Wei Jun,Li Jing.A service-Oriented Workflow Access Control Model[J].Journal of Computer Research and Development.2005,42(8):1369-1375.
    [145]Aizhong Lin,Erik Vullings,and James Dalziel.A trust-based access control model for virtual organizations[C].Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops,2006,557-564.
    [146]Humphrey M,Thompson M R,and Jackson K R.Security for grids[J].Proceedings of IEEE,2005,93(3):644-652.
    [147]Laszewski G V,Gawor J,Krishnan S,et al.Grid computing:Making the Global Infrastructure a Reality[J].Communications Networking and Distributed Systems,2003.
    [148] Schlosser A, Voss M, and Bruckner L. Comparing and evaluating metrics for reputation systems by simulation [C]. Proceedings of the IEEE Workshop on Reputation in Agent Societies, 2004.
    [149] Huang Quan-neng, Song Jia-xing, L:.u Wei-dong, et al. Survey of reputation system on peer-to-peer network [J]. Mini-Micro system, 2006, 27(7): 1175-1181.
    [150] Xiong L, Liu L A reputation-based trust model for peer-to-peer ecommerce communities [C]. Proceedings of the IEEE Conference on E-Commerce, 2003.
    [151] Whitby A, J(?)sang A, and Indulska J. Filtering out unfair ratings in Bayesian reputation systems [J]. The Icfain Journal of Management Research, 2005, 4(2):48-64.
    [152] Fourquet E, Larson K, Cowan W. A reputation mechanism for layered communities [J]. ACM SIGecom Exchanges, 2006, 6(1): 11-22.
    
    [153] Runfang Zhou, Kai Hwang. Trust overlay networks for global reputation aggregation in p2p grid computing [C]. Proceedings of IEEE International Parallel and Distributed Proceeding Symposium, 2006, 25-29.
    
    [154] Voss M, and Wiesemann W. Using reputation systems to cope with trust problems in virtual organizations [C]. Proceedings of the 3rd International Workshop on Security in Information Systems, 2005. 186-195.
    
    [155] Robinson P, Karabulut Y, and Haller J. Dynamic virtual organization management for service oriented enterprise applications. Proceedings of the 1st International Conference on Collaborative Computing, San Jose, CA, USA, 2005 [C]. IEEE Computer Society, 2005.
    [156] Strader T, Lin F, and Shaw M. Information structure for electronic virtual organization management [J], Decision Support Systems 23, 1998, 75-94.
    [157] Haller J, Karabulut Y, and Robinson P. Security controls in collaborative business processes. Proceedings of the 6th 1FIP Working Conference on Virtual Enterprise,Valencia, Spain, 2005 [C], 186(9): 247-254.
    [158] Fetanat A, and Feshaareki M N. Trustworthy in Virtual Organization [C].Proceedings of world academy of science, engineering and technology, 2008, 470-474.
    
    [159] Voss M, and Wiesemann W. Using reputation systems to cope with trust problems in virtual organizations. Proceedings of the 3rd International Workshop on Security in Information Systems, Miami, USA, 2005 [C]. IEEE Computer Society, 2005,186-195.
    
    [160] Squicciarini A, Paci F, and Bertino E. Trust establishment in the formation of Virtual Organizations [C]. Proceedings of IEEE 24th International Conference on Data Engineering Workshop, ICDEW 2008, Cancun, Mexico: 2008, 454-461.
    [161]林剑柠,吴慧中.基于主观逻辑理论的网格信任模型分析[J].计算机研究与发展.2007,44(8):1365-1370.
    [162]Avila-Rosas A,Luck M.A direct reputation model for VO formation[C].Proceedings of the 4th Int.Central Eastern Eur.Conf.Multi-Agent Syst.(CEEMAS 2005),Budapest,Hungary:2005,460-469.
    [163]陈菲菲,桂小林.基于机器学习的动态信誉评估模型研究[J].计算机研究与发展,2007,44(2):223-229.
    [164]Silaghi G C,Arenas A E,Silva L M.A utility-based reputation model for service-oriented computing[C].Proceedings of the CoreGRID Symposium,Rennes,France:CoreGRID Springer Series,2007:65-74.
    [165]Lavrac N,Ljubic P,Urbancic T,Papa G,Jermol M,Bollhalter S.Trust modeling for networked organizations using reputation and collaboration estimates[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C:Applications and Reviews,2007,37(3).:429-439.
    [166]Yanchao Zhang,Yuguang Fang.A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks[J].IEEE Transactions on parallel and distributed systems,2007,18(8):1134-1145.
    [167]Maximilien E M,Singh M P.A framework and ontology for dynamic web services selection[J].IEEE Internet Computing,2004,8(5):84-93.
    [168]Yang G,Chen H P.An extensible computing model for reputation evaluation based on objective and automatic feedbacks.Proceedings of International Conference on Advanced Language Processing and Web Information Technology,Luoyang,Henan,China,2008[C].IEEE Computer Society,2008,585-592.
    [169]Yang X J,Qu X L,and Gui C M.Towards Reliable Rating Filtering in Grid Reputation Systems:A Pre-Evaluating Set Based Bias-Tuned Approach.Proceedings of 2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing,Washington,DC,USA,2006[C].IEEE Computer Society,2006,129-136.
    [170]Mei Y D,Dong X S,and Tian Z H,et al.EntityTrust:Feedback credibility-based global reputation mechanism in cooperative computing system.Proceedings of 12th International Conference on Computer Supported Cooperative Work in Design(CSCWD 2008),Xi' an,China,2008[C].IEEE Computer Society,2008,797-802.
    [171]孙宇清.协同环境中访问控制模型与技术研究[D].山东大学,2006.
    [172]Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based access control models [J].IEEE Computer,1996,29(2):38-47.
    [173]钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784.
    [174]李成锴,詹永照.基于角色的CSCW系统访问控制模型[J].软件学报,2000,11(7):931-937.
    [175]王治纲,王晓刚,卢正鼎.多数据库系统中基于角色的访问控制策略研究[J].计算机工程与科学,2005,27(2):55-57.
    [176]Nyanchama M,Osborn S.Access Rights Administration in Role-Based Security Systems[C].Proceedings of the IFIP Working Group 11.3 Working Conference on Database Security Ⅶ.Amsterdam:North-Holland,1994.37-56.
    [177]Nyanchama M,Osborn S.Modeling Mandatory Access Control in Role-Based Security Systems[C].Proceedings of Database Security Ⅷ:Status and Prospects.London,UK:Chapman and Hall Ltd.,1996:129-144.
    [178]Nyanchama M,Osborn S.The Role Graph Model and Conflict of Interest[J].ACM Transaction on Information System Security,1999,2(1):3-33.
    [179]Freudenthal E,Pesin T,Port L,et al.dRBAC:distributed role-based access control for dynamic coalition environments[C].Proceedings of 22nd International Conference on Distributed Computing Systems,2002,411-420.
    [180]廖俊国,洪帆,杨秋伟,张昭理.dRBAC模型的安全分析[J].小型微型计算机系统,2007,28(7):1177-1180.
    [181]Aizhong Lin,Erik Vullings,and James Dalziel.A trust-based access control model for virtual organizations[C].Prcceedings of 5th International Conference on Grid and Cooperative Computing Workshops,2006,557-564.
    [182]KalamA A E,Baida R E,Balbiani P,et al.Organization based access control[C].Proceedings of 4th IEEE International Workshop on Policies for Distributed Systems and Networks,2003,120-131.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700