自动化技术、计算机技术 |
|
|
|
|
信任管理中的匿名授权方法 |
彭志宇, 李善平, 杨朝晖, 林欣 |
浙江大学 计算机科学与技术学院, 浙江 杭州 310027 |
|
Anonymous authorization in trust management |
PENG Zhi-yu, LI Shan-ping, YANG Zhao-hui, LIN Xin |
College of Computer Science and Technology,Zhejiang University,Hangzhou 310027, China |
引用本文:
彭志宇, 李善平, 杨朝晖, 林欣. 信任管理中的匿名授权方法[J]. J4, 2010, 44(5): 897-902.
BANG Zhi-Yu, LI Shan-Beng, YANG Chao-Hui, LIN Xin. Anonymous authorization in trust management. J4, 2010, 44(5): 897-902.
链接本文:
http://www.zjujournals.com/eng/CN/10.3785/j.issn.1008-973X.2010.05.011
或
http://www.zjujournals.com/eng/CN/Y2010/V44/I5/897
|
[1] BLAZE M,FEIGENBAUM J,LACY J. Decentralized trust management [C] ∥ Proceedings of the IEEE 17th Symposium on Security and Privacy.Oakland,CA: IEEE,1996: 164173.
[2] CLARKE D,ELIEN J,ELLISON C,et al.Certificate chain discovery in SPKI/SDSI [J].Journal of Computer Security,2001,9(4): 285322.
[3] LI Ninghui,WINSBOROUGH W,MITCHELL J.Distributed credential chain discovery in trust management [J].Journal of Computer Security,2003,11(1): 3586.
[4] CHAPIN P,SKALKA C,WANG X.Authorization in trust management: features and foundations [J].ACM Computing Surveys,2008,40(3): 148.
[5] SWEENEY L.Kanonymity: a model for protecting privacy [J].International Journal on Uncertainty, Fuzziness and Knowledgebased Systems,2002,10(5): 557570.
[6] BERESFORD A,STAJANO F.Location privacy in pervasive computing [J].IEEE Pervasive Computing,2003, 2(1): 4655.
[7] XU T,CAI Y.Exploring historical location data for anonymity preservation in locationbased services [C] ∥ Proceedings of IEEE International Conference on Computer Communication (INFOCOM). Arizona,USA: IEEE,2008: 547555.
[8] GEDIK B,LIU L.Protecting location privacy with personalized kanonymity:architecture and algorithms [J].IEEE Transactions on Mobile Computing,2008,7(1): 118.
[9] 高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2): 305314.
GAO Ying,CHENG Taoyuan,WANG Shan.Certificates storage strategy and search algorithm based on Hilbert curve [J].Journal of Software,2006,17(2): 305314.
[10] WINSBOROUGH W,SEAMONS K,JONES V.Automated trust negotiation [C] ∥ Proceedings of the DARPA Information Survivability Conference and Exposition. South Carolina,USA: IEEE,2000: 88102. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|