跳到主要內容

臺灣博碩士論文加值系統

(3.236.23.193) 您好!臺灣時間:2021/07/24 12:58
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:高詠傑
研究生(外文):Kao,Yongchieh
論文名稱:敏感憑證保護之預先協商代理者
論文名稱(外文):ANNA : Advanced Negotiation Agent For Protecting Sensitive Credentials In Automated Trust Negotiation
指導教授:鄭伯炤
指導教授(外文):Cheng,Bochao
口試委員:盧東宏李忠憲陳煥
口試委員(外文):Lu,TunghongLi,JungshianChen,Huan
口試日期:2012-07-25
學位類別:碩士
校院名稱:國立中正大學
系所名稱:通訊工程研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2012
畢業學年度:100
語文別:中文
論文頁數:68
中文關鍵詞:網路應用服務自動信任協商機制代理者憑證隱私
外文關鍵詞:Automated Trust NegotiaitonCedentialTrustSensitive credentialAdvanced negotiaiton
相關次數:
  • 被引用被引用:0
  • 點閱點閱:221
  • 評分評分:
  • 下載下載:2
  • 收藏至我的研究室書目清單書目收藏:0
近幾年來,由於網路連線的速度品質大幅提升,如電子商務、網路銀行等…相關的網路應用服務蓬勃發展,然而,在網路的環境中的連線雙方往往是互相陌生的,在這個情況下,需要透過自動信任協商機制(Automated Trust Negotiation, ATN),使雙方達到相互的信賴,得以進行應用服務或資源存取的動作。在協商的過程中,使用者與主機間會透過憑證的交換來互相驗證,這些憑證通常都帶有一些敏感的隱私資訊,如何在協商過程中減少敏感資訊的洩漏,是我們所需要探討的議題。為了解決這樣的問題,我們提出了一個預先協商代理者(Advanced Negotiation Agent, ANNA),透過一個受信賴的第三方,藉由雙方的協商策略來進行預先協商的動作,藉此減少不需要的憑證交換,並選擇敏感程度較低的憑證來進行交換。經過我們的實驗證實,協商的雙方透過ANNA的協助,能夠有效的降低敏感憑證資訊的洩漏,並減少多餘的憑證交換,大幅提升ATN的效率。
In recent years, there are more and more web services which have participated in Internet. Automated Trust Negotiation (ATN) enables independent entities working together without human/manual interactions and prior trust relationships. The credentials are treated as tokens to establish trust between two strange entities, which can make connections and do business together if ATN is successful. A good ATN negotiation strategy should exchange sensitive credentials on an as-needed base. In this paper, we proposed a trust third party agent, Advanced NegotiatioN Agent (ANNA), for the advanced negotiation. The experiments show that ANNA is able to decrease unnecessary credential exchange and reduce the communication overhead in the trust negotiation process.
第一章. 簡介 1
1.1 現況概要 1
1.2 研究動機 3
1.3 論文架構 5
第二章. 理論背景 6
2.1 現有Trust Negotiation 機制簡介 6
2.1.1 ATN 6
2.1.2 PRUNES 9
2.1.3 Agent 12
2.1.4 LTTP 13
2.2 現有方法之優缺點 18
2.2.1 各方法的缺點 18
2.2.2 ANNA與其他方法的比較 19
第三章. 研究方法 22
3.1 系統架構 23
3.2 Negotiation Graph 28
3.3 Sensitive Cost 34
3.4 Example 36
第四章. 實驗及分析 44
4.1 實驗參數配置 44
4.2 實驗結果分析 47
第五章. 結論 55

[1]W. Winsborough, K. Seamons and V. Jones,”Automated Trust Negotiation”, submitted for journal publication, April 2000
[2]William H. Winsborough, Kent E. Seamons, andVickiE. Jones.Automatedtrust negotiation. InDARPA Information Survivability Conference and Exposition, Volume 1, pages 88–102. IEEE Press, January 2000.
[3]Kent E. Seamons, Marianne Winslett, and Ting Yu.Limiting the disclosure of access control policies during automated trust negotiation. In Proceedings of the Symposium on Network and Distributed System Security (NDSS’01), February 2001.
[4]William H. Winsborough and Ninghui Li. Protecting sensitive attributes in automated trust negotiation. In Proceeding of theACMWorkshop on Privacy in the Electronic Society, pages 41–51. ACMPress, 2002.
[5]William H. Winsborough and Ninghui Li. Towards practical automated trust negotiation. In Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY’02), pages 92–103, June 2002.
[6]Ting Yu, Xiaosong Ma, and Marianne Winslett. PRUNES: an efficient and complete strategy for automated trust negotiation over the internet. In Proceedings of the 7th ACM conference on Computer and communications security, pages 210–219. ACMPress, 2000.
[7]Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information System Security, 6(1):1–42, 2003.
[8]A. Herzberg, J. Mihaeli, Y. Mass,D. Naor, and Y. Ravid. Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers, IEEE Symposium on Security and Privacy, Oakland, CA , May 2000.
[9]Kent E. Seamons, Marianne Winslett, Ting Yu, L. Yu, and R. Jarvis. Protecting privacy during on-line trust negotiation. In Proceeding of the 2nd Workshop on Privacy Enhancing Technologies, April 2002.
[10]E. Bina, V. Jones, R. McCool, and M. Winslett, “Secure Access to Data Over the Internet,” Proceedings of the Third ACM/IEEE International Conference on Parallel and Distributed Information Systems, Austin, Texas, Sept., 1994.
[11]William H. Winsborough and Ninghui Li. Protecting sensitive attributes in automated trust negotiation. In Proceeding of theACMWorkshop on Privacy in the Electronic Society, pages 41–51. ACMPress, 2002.
[12]Ting Yu and Marianne Winslett. A unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110–122. IEEE Computer Society, 2003.
[13]W. Winsborough, K. Seamons, and V. Jones, “Negotiating Disclosure of Sensitive Credentials,” Second Conference on Security in Communication Networks (SCN ’99), September, 1999.
[14]B. Schneier, Applied Cryptography, John Wiley and Sons, Inc., second edition.
[15]Xiu, D. and Liu, Z., A Dynamic Trust Model for Pervasive Computing Environments, the Fourth Annual Security Conference, Las Vegas, NV, March 30-31, 2005.
[16]Trust negotiation in peer-to-peer systems. Technical Report (in progress), 2004, available at http://scens.cs.dartmouth.edu.
[17]Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the Tenth International Conference on Information and Knowledge Management, pages 310–317. ACM Press, 2001.
[18]N. Ching, V. Jones, and M. Winslett, “Authorization in the Digital Library: Secure Access to Services across Enterprise Boundaries,” Proceedings of ADL '96 --- Forum on Research and Technology Advances in Digital Libraries, Washington, DC, May 1996. Available at http://drl.cs.uiuc.edu/security/pubs.html.
[19]E. Bertino E. Ferrari A. C. Squicciarini E Ngineering Elisa Bertino Elena Ferrari Cerias Tech Report 2004-68 Trust Negotiation: Concepts, Systems and Languages
[20]Song Ye, Fillia Makedon, and James Ford, "Collaborative Automated Trust Negotiation in Peer-to-Peer Systems."
[21]Ernesto Damiani, De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, and Fabio Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 207–216. ACMPress, 2002.
[22]Weifeng Chen, Lori Clarke, Jim Kurose, and Don Towsley, "Optimizing Cost-sensitive Trust-negotiation Protocols."
[23]Zhaoyu Liu and Daoxi Xiu, "Agent-based Automated Trust Negotiation for Pervasive Computing."
[24]W. Winsborough. K. Seamons, and V. Jones. Negotiating disclasure of sensitive credentials. In SCN’99, Amalfi, Italy, September 1999.
[25]E. Bina, V. Jones, R. McCool, and M. Winslett, “Secure Access to Data Over the Internet,”Proceedings of the Third ACM/IEEE International Conference on Parallel and Distributed Information Systems, Austin, Texas, Sept., 1994.
[26]R. Shinghal, Formal Concepts in Artificial Intelligence, Chapman & Hall Computing,1992
[27]L. Kanal and V. Kumar, Search in Artificial Intelligence, Springer-Verlag, 1988.

QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top