English  |  正體中文  |  简体中文  |  Items with full text/Total items : 52048/87179 (60%)
Visitors : 8870539      Online Users : 225
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/98075

    Title: On Access Control Policy Assignments and Negotiation Strategies in Automated Trust Negotiation
    Authors: Chuang, Po-Jen;Ni, Ming-Yu
    Contributors: 淡江大學電機工程學系
    Keywords: network security;automated trust negotiation;access control policies;credentials;negotiation strategies;virtual networks;experimental evaluation;trust management;negotiation efficiency
    Date: 2014
    Issue Date: 2014-05-24 13:00:38 (UTC+8)
    Publisher: Olney:Inderscience Publishers
    Abstract: Trust management can be used to deal with a number of security issues in virtual networks. In internet communications, efficient secure trust negotiation between virtual individuals/organisations is very important as it can achieve resource sharing, collaborative computing and communication security. This investigation aims to strengthen the efficiency and security of trust negotiation by using: 1) a more advanced negotiation strategy to facilitate negotiation; 2) more precise principles to attain better access control policy assignments; 3) iterative computation and a cache mechanism to further enhance negotiation efficiency. Experimental evaluation is conducted to compare the performance of our strategy and related strategies under several performance measures of interest. The result shows that our new strategy outperforms other strategies in most situations as it obtains a well-balanced trade-off between the efficiency and security of trust negotiation.
    Relation: International Journal of Security and Networks 9(2), pp.104-113
    DOI: 10.1504/IJSN.2014.060744
    Appears in Collections:[電機工程學系暨研究所] 期刊論文

    Files in This Item:

    File Description SizeFormat

    All items in 機構典藏 are protected by copyright, with all rights reserved.

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - Feedback