资源描述:
《an intergration of reputation-based and policy-based trust》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、AnIntegrationofReputation-basedandPolicy-basedTrustManagement?PieroBonatti1,ClaudiuDuma2,DanielOlmedilla3,andNahidShahmehri21UniversitadiNapoliFedericoII,Napoli,Italy`bonatti@na.infn.it2DepartmentofComputerandInformationScience,Linkopingsuniversitet¨fcladu,nahshg@ida.liu.se3L3
2、SResearchCenterandUniversityofHannover,Hanover,Germanyolmedilla@l3s.deAbstract.Trustmanagementiscurrentlybeingtackledfromtwodifferentperspec-tives:a“strongandcrisp”approach,wheredecisionsarefoundedonlogicalrulesandverifiablepropertiesencodedindigitalcredentials,anda“softandsoci
3、al”approach,basedonreputationmeasuresgatheredandsharedbyadistributedcommunity.Weanalyzethedifferencesbetweenthetwomodelsoftrustandarguethatanintegratedapproachwouldimprovesignificantlytrustmanagementsystems.Wesupportourclaimwithrealworldscenariosandillustratehowthetwomodelsarei
4、ntegratedinPROTUNE,thecorepolicyspecificationlanguageofthenetworkofexcellenceREWERSE.1IntroductionTrustmanagementhasbeenanimportantresearchlineinthedevelopmentofmodernopendistributedanddecentralizedsystems.Trusthasbeenstudiedinthecontextofdecentral-izedaccesscontrol[5,16],publi
5、ckeycertification[4,9],andreputationsystemsforP2Pnetworks[2,14,10].Thereexistcurrentlytwodifferentmajorapproachesformanagingtrust:policy-basedandreputation-basedtrustmanagement.Thetwoapproacheshavebeendevelopedwithinthecontextofdifferentenvironmentsandtargetingdifferentrequirem
6、ents.Ontheonehand,policy-basedtrustreliesonobjective“strongsecurity”mechanismssuchassignedcertificatesandtrustedcertificationauthorities(CAhereafter)inordertoregulatetheac-cessofuserstoservices.Moreover,theaccessdecisionisusuallybasedonmechanismswithwelldefinedsemantics(e.g.,logi
7、cprogramming)providingstrongverificationandanalysissupport.Theresultofsuchapolicy-basedtrustmanagementapproachusuallyconsistsofabinarydecisionaccordingtowhichtherequesteristrustedornot,andthustheservice(orresource)isallowedordenied.Ontheotherhand,reputation-basedtrustreliesona“
8、softcomputational”approachtotheproblemoftrust.Inthiscase,trus