Distributed Certificates Chain Searching Algorithms Based on Trustworthy

نویسندگان

  • Jianyun Lei
  • Yanhong Li
چکیده

To address the distributed certificates searching problem in trust management, the member set and privilege set are defined, the forward, backward and bidirectional distributed certificates searching algorithms based on the definitions are brought forward, the complexity of the algorithms and also the comparison of the algorithms and existing algorithms are analyzed, the application of the algorithms is described with an instance. It is proved that the algorithm has high practicability and efficiency with the preprocess functions.

منابع مشابه

Weighted Pushdown Systems and Trust-Management Systems

The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trustmanagement system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains. The certificate-chain-discovery problem is to discover a proof of authorization for a given request. ...

متن کامل

Efficient Verification of Delegation in Distributed Group Membership Management

In ad-hoc networks and other highly distributed and decentralized environments, authorization certificates can be used to control access. Moreover, it is possible to delegate rights listed in the certificate to another users. Several such subsequent delegations build a chain of certificates. Chains of delegation certificates can improve the capability and manageability of systems. Distributed g...

متن کامل

Distributed Certificate-Chain Discovery in SPKI/SDSI

The authorization problem is to decide whether, according to a security policy, some principal should be allowed access to a resource. In the trust-management system SPKI/SDSI, the security policy is given by a set of certificates, and proofs of authorization take the form of certificate chains. The certificate-chain-discovery problem is to discover a proof of authorization for a given request....

متن کامل

PAMINA: A Certificate Based Privilege Management System

In this paper we present PAMINA (Privilege Administration and Management INfrAstructure), a privilege management system using authorization certificates. Our system supports distributed environments where autonomous authorities can manage and delegate privileges in accordance with their own policies. We introduce Improved Certification Verification Trees (I-CVTs) that guarantee very efficient a...

متن کامل

Camparison of Numerically Stability of Two Algorithms for the Calculation of Variance

In descriptive statistics, there are two computational algorithms for determining the variance S2, of a set of observations : Algorithm 1: S2= - , Algorithm 2: S2= , where . It is interesting to discuss, which of the above formulas is numerically more trustworthy in machine numbers sets. I this paper, based on total effect of rounding error, we prove that the second Algorithm is better...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:
  • Journal of Multimedia

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014