{"title":"基于安全日志的信任协商模型","authors":"Cao Yuan, Yaqin Li, Jun Yan, Zhengsong Liao","doi":"10.1109/CINC.2009.83","DOIUrl":null,"url":null,"abstract":"Trust Negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track users’ deed and so on.... Security log provides a method to analyze the past and present status of TN for system administrator. According the current state of TN, a security log based trust negotiation model is proposed in the paper by combining security log with TN, which helps efficiently find out why the negotiation fails and track users’ deed by recording all kinds of negotiation states.","PeriodicalId":173506,"journal":{"name":"2009 International Conference on Computational Intelligence and Natural Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Security Log Based Trust Negotiation Model\",\"authors\":\"Cao Yuan, Yaqin Li, Jun Yan, Zhengsong Liao\",\"doi\":\"10.1109/CINC.2009.83\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trust Negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track users’ deed and so on.... Security log provides a method to analyze the past and present status of TN for system administrator. According the current state of TN, a security log based trust negotiation model is proposed in the paper by combining security log with TN, which helps efficiently find out why the negotiation fails and track users’ deed by recording all kinds of negotiation states.\",\"PeriodicalId\":173506,\"journal\":{\"name\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computational Intelligence and Natural Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CINC.2009.83\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computational Intelligence and Natural Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CINC.2009.83","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Trust Negotiation (TN) is an approach to establish trust relationship between strangers by disclosing iteratively credentials and access control policies. In open and distributed environment TN brings convenience in resource share, while it still has some shortcomings, such as easy to fail in negotiation, difficult to track users’ deed and so on.... Security log provides a method to analyze the past and present status of TN for system administrator. According the current state of TN, a security log based trust negotiation model is proposed in the paper by combining security log with TN, which helps efficiently find out why the negotiation fails and track users’ deed by recording all kinds of negotiation states.