首页 | 官方网站   微博 | 高级检索  
     

基于面向对象信任攻击图的信任风险传播模型
引用本文:陆秋琴,和涛,黄光球.基于面向对象信任攻击图的信任风险传播模型[J].计算机工程,2012,38(4):129-133.
作者姓名:陆秋琴  和涛  黄光球
作者单位:西安建筑科技大学管理学院,西安,710055
基金项目:西安建筑科技大学人才科技基金资助项目(RC1019);陕西省重点学科建设专项基金资助项目(zdxk2010)
摘    要:针对信任环境系统中存在的信任攻击问题,设计基于面向对象的信任攻击图模型。利用Take规则、Grant规则和Pervade规则,描述信任主体对象属性弱点导致的信任级别的提升、信任关系的传递、渗透与扩散问题,使攻击可达距离更大。根据弱点利用规则和信任关系盗用规则,提出多项式时间复杂度信任关系传递闭包生成算法及基于信任关系传递闭包的信任风险传播算法。实验结果证明了该模型的正确性。

关 键 词:信任  风险传播模型  信任攻击  信任关系网络  信任关系盗用
收稿时间:2011-07-21

Trust Risk Propagating Model Based on Object-oriented Trust Attack Graph
LU Qiu-qin , HE Tao , HUANG Guang-qiu.Trust Risk Propagating Model Based on Object-oriented Trust Attack Graph[J].Computer Engineering,2012,38(4):129-133.
Authors:LU Qiu-qin  HE Tao  HUANG Guang-qiu
Affiliation:(School of Management, Xi'an University of Architecture & Technology, Xi'an 710055, China)
Abstract:In order to study the trust attack problem in complicated trust environment, the object-oriented trust attack graph model is put forward. In the model, the rule take, grant and pervade are used to describe trust level escalating, trust relation transiting, pervading and spreading resulting from utilization of vulnerabilities existing in attributes of trust entity objects, therefore a longer attack reachable distance can be reached. The model carries the attack complexity and harmfulness index which are used to determine the attack threat index, the vulnerability utilizing rules and trust relation embezzling rules are used to establish the trust relation transitive closure generating algorithm with polynomial time complexity, based on which a trust risk propagating algorithm is established. Through an experiment based on modeling real vulnerabilities for a system, the model is proofed to be correct.
Keywords:trust  risk propagating model  trust attack  trust relation network  trust relation embezzling
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号