[1]张国治 党小超 魏伟一.基于信任域的P2P访问控制模型研究[J].计算机技术与发展,2006,(08):228-230.
 ZHANG Guo-zhi,DANG Xiao-chao,WEI Wei-yi.Trust Domain- Based Management Model in P2P Access Control[J].,2006,(08):228-230.
点击复制

基于信任域的P2P访问控制模型研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2006年08期
页码:
228-230
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Trust Domain- Based Management Model in P2P Access Control
文章编号:
1673-629X(2006)08-0228-03
作者:
张国治1 党小超2 魏伟一1
[1]西北师范大学数学与信息科学学院[2]西北师范大学网络学院
Author(s):
ZHANG Guo-zhi DANG Xiao-chao WEI Wei-yi
[1]College of Mathematics and Information Science,Northwest Normal University[2]College of Network, Northwest Normal University
关键词:
P2P访问控制角色信任管理
Keywords:
P2P access control role reputation management
分类号:
TP393.08
文献标志码:
A
摘要:
P2P作为一项愈来愈流行的技术,在资源共享和协同协作方面有崭新的应用。但是这种新的技术面临传统的网络所未曾遇到的网络安全方面的严重考验。文中从实际应用出发,分析了现有的访问控制技术并在此基础上提出一种新的基于信任域的P2P访问控制模型。该模型不同于传统的基于PKI的访问控制模型,它能够在信任管理的基础上对P2P用户进行域划分,并针信任对域制定访问控制策略,从而使得访问控制在实际应用中更加简洁和可行
Abstract:
Peer-to-peer (P2P) has become popular as a new technology for the resources sharing and coordinatlon. However, the P2P environments make the task of controlling access to network security more difficult, which cannot be done by traditional access control methods. In this paper,analyses the technique of access- control requirements in such environments and proposes a trust domain- based access control framework for P2P environment. The framework is different from traditional access- control framework, which can define P2P user's trust domain- based in reputation management and define the access- control strategy for trust domain. The proposed scheme is realistic and feasible in P2P application

相似文献/References:

[1]宫博 王汝传.基于会话的局域网P2P流量识别方法的研究[J].计算机技术与发展,2010,(03):5.
 GONG Bo,WANG Ru-chuan.Research on Method of Session - Based P2P Network Traffic Identification[J].,2010,(08):5.
[2]范会波 张新有.基于P2P的文件共享系统的设计与实现[J].计算机技术与发展,2010,(03):48.
 FAN Hui-bo,ZHANG Xin-you.Design and Implementation of File - Sharing System Based on P2P[J].,2010,(08):48.
[3]黄益贵 王汝传.基于DM6446的P2P机顶盒OSD研究与实现[J].计算机技术与发展,2010,(04):220.
 HUANG Yi-gui,WANG Ru-chuan.Research and Implementation of OSD for P2P Set - Top - Box Based on DM6446[J].,2010,(08):220.
[4]徐苏磊 梁伟.基于Netfilter/Iptables内核扩展的P2P流量管理[J].计算机技术与发展,2010,(06):101.
 XU Su-lei,LIANG Wei.P2P Flow Control Based on Netfilter/Iptables Kernel Extension[J].,2010,(08):101.
[5]龚世忠 唐文忠.一种基于P2P的两阶段Web服务发现研究[J].计算机技术与发展,2010,(06):121.
 GONG Shi-zhong,TANG Wen-zhong.A Web Services Discovery Research of Two Stages Based on P2P[J].,2010,(08):121.
[6]李磊 董健全.基于博弈论的P2P激励机制的研究与设计[J].计算机技术与发展,2009,(05):5.
 LI Lei,DONG Jian-quan.Research and Design of An Incentive Mechanism of P2P Based on Game Theory[J].,2009,(08):5.
[7]黄世权.网络存储安全分析[J].计算机技术与发展,2009,(05):170.
 HUANG Shi-quan.Analysis of Network Storage's Safety[J].,2009,(08):170.
[8]万川龙 桑军 向宏 胡海波.基于P2P网络的视频点播系统设计[J].计算机技术与发展,2009,(06):17.
 WAN Chuan-long,SANG Jun,XIANG Hong,et al.A P2P Based Video- on- Demand System[J].,2009,(08):17.
[9]黄晟 刘海韬.基于WHOIS建立IP位置系统实现P2P拓扑感知[J].计算机技术与发展,2009,(07):80.
 HUANG Sheng,LIU Hai-tao.Build IP Location System Using WHOIS for P2P Network Topology - Aware Routing[J].,2009,(08):80.
[10]程春玲 张登银.实现DRM系统的一种新方案[J].计算机技术与发展,2009,(07):166.
 CHENG Chun-ling,ZHANG Deng-yin.A New Implementation Scheme for Secure DRM System[J].,2009,(08):166.
[11]杨灿 汤圣博 黄辉泽.企业级P2P视频会议系统设计与实现[J].计算机技术与发展,2009,(09):186.
 YANG Can,TANG Sheng-bo,HUANG Hui-ze.Design and Implementaion of Enterprise Video Conference System Based on P2P[J].,2009,(08):186.
[12]王杨 林涛[] 王汝传[].计算网格中访问控制策略研究与应用[J].计算机技术与发展,2006,(08):231.
 WANG Yang,LIN Tao,WANG Ru-chuan.Research and Application on Access Control Policy Based on Computing Grid[J].,2006,(08):231.

备注/Memo

备注/Memo:
张国治(1977-),男,甘肃凉州人,讲师,硕士,研究方向为计算机网络应用 党小超,教授,硕士生导师,研究方向为计算机网络工程及应用
更新日期/Last Update: 1900-01-01