Research on Trustworthy Mechanism Based on Agent

It is very important in theory and application to evaluate credibility of trust model. Although many application models are carefully analyzed, designed and implemented, there exist some faults yet. In this paper we studied trust relationship of agents, proposed a credibility calculation model among entities and gave their complete calculation method. It considered dynamic changes of trust relationship and focused on dynamic updating strategy of credibility. In course of calculation cross chain of trust was simplified reasonably by defining and processing associated chain of trust. When carrying on updating calculation of recommendation trust, it considered not only present evaluation result but also historical evaluation records and made evaluation system more rational. A dynamic access control algorithm based on credibility was also present. It enhanced flexibility of mobile process and availability of network security facility. In end of this paper, an experiment on direct trust relationship and recommendation trust relationship among agents was carried on. Experiment results showed that after some circle calculations trust relationships among agents reached a stable state and the credibility calculation model was feasible.

[1]  Srilekha Mudumbai,et al.  Certificate-based authorization policy in a PKI environment , 2003, TSEC.

[2]  Peng Shuanghe Application of Trusted Computing Platform in Trust Management , 2009 .

[3]  Manish Parashar,et al.  Dynamic context-aware access control for grid applications , 2003, Proceedings. First Latin American Web Congress.

[4]  Franz J. Hauck,et al.  Proxy-based Security for the Session Initiation Protocol (SIP) , 2007, 2007 Second International Conference on Systems and Networks Communications (ICSNC 2007).

[5]  Ian T. Foster,et al.  Security for Grid services , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.

[6]  Han Yongqiao A New Type Trusted Platform Module(TPM) , 2008 .

[7]  Steven Tuecke,et al.  X.509 Proxy Certificates for Dynamic Delegation , 2004 .

[8]  Joan Feigenbaum,et al.  Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.

[9]  Wang Yu-fei Security mechanism of SIP based on HTTP digest authentication , 2005 .