Fine-Grain Trusted Storage and Transitivity Policy for Open Network Environment

Trusted system will be an important trend of the research in the field of security. The new architecture of trusted model is proposed for open network, which describes the trust-building processes from many ways. Fine-grain trusted storage structures are designed based on interaction ability and honesty capability, which are based on n history windows. On this condition, trusted transitivity tree based on honesty is studied, which enhances the rationality of the model. Then trusted path-searching policy is presented, which is based on depth-first traversal. Experimental results show that new trusted models conform to the social communication relations.

[1]  Stuart E. Schechter Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.

[2]  Chen Jian-gang Authorization delegation mechanism based trust level in grid computing , 2008 .

[3]  Sun Yu Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks , 2009 .

[4]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[5]  Li-Jun Chen,et al.  Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks: Bayesian Decision-Making Based Recommendation Trust Revision Model in Ad Hoc Networks , 2009 .

[6]  Reza,et al.  Authenticated Key Agreement Protocol , 2010 .

[7]  Edward W. Felten,et al.  Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks? , 2003, IEEE Secur. Priv..

[8]  Shuai Wang,et al.  An Evaluation Approach of Subjective Trust Based on Cloud Model , 2008, CSSE.

[9]  Xiao-Yong Li,et al.  Cognitive Model of Dynamic Trust Forecasting: Cognitive Model of Dynamic Trust Forecasting , 2010 .

[10]  Haiyan Wang,et al.  The extended RBAC model based on grid computing , 2006 .

[11]  Mehmet Sahinoglu,et al.  Security meter: a practical decision-tree model to quantify risk , 2005, IEEE Security & Privacy Magazine.

[12]  Ruchuan Wang,et al.  CPK-based grid authentication: a step forward , 2007 .

[13]  Haiyan Wang,et al.  Trusted Decision Mechanism Based on Fuzzy Logic for Open Network , 2008, J. Comput..

[14]  Peng Xue Research on Trustworthy Networks , 2005 .

[15]  Li Xiao Cognitive Model of Dynamic Trust Forecasting , 2010 .

[16]  Wei-ling Wu,et al.  Reduced-Complexity Turbo Equalization for Turbo Coded MIMO/OFDM Systems , 2006 .

[17]  Li Zhang,et al.  Evaluation Approach of Subjective Trust Based on Cloud Model: Evaluation Approach of Subjective Trust Based on Cloud Model , 2010 .