作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2009, Vol. 35 ›› Issue (4): 165-166. doi: 10.3969/j.issn.1000-3428.2009.04.058

• 安全技术 • 上一篇    下一篇

P2P权限委托与访问控制模型

刘仁芬1,张常有2,李彦华3   

  1. (1. 石家庄铁道学院四方学院,石家庄 050043;2. 北京理工大学计算机科学与技术学院,北京 100081;3. 石家庄铁路运输学校,石家庄 050043)
  • 收稿日期:1900-01-01 修回日期:1900-01-01 出版日期:2009-02-20 发布日期:2009-02-20

Privilege Delegation and Access Control Model for P2P

LIU Ren-fen1, ZHANG Chang-you2, LI Yan-hua3   

  1. (1. Sifang Department, Shijiazhuang Railway Institute, Shijiazhuang 050043; 2. School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081;3. Shijiazhuang Railway Transportation School, Shijiazhuang 050043)
  • Received:1900-01-01 Revised:1900-01-01 Online:2009-02-20 Published:2009-02-20

摘要: 提出了一种P2P权限委托与访问控制模型,该模型包括3个主要协议,即权限委托协议、资源检索协议和访问控制协议。根据权限委托协议,委托发起方PEER_S选择信誉值高的对等点作为受委托对等点PEER_D,颁发权限委托证书Cd。按资源检索协议,PEER_D选择信誉值高的资源提供者发送资源请求。根据访问控制协议,资源提供者PEER_R通过资源请求者的信誉证书集Cts和权限委托证书Cd进行访问控制。基于着色Petri网验证协议模型的可达性等性质,使用CPN Tools对协议进行模拟仿真。

关键词: 对等网, 权限委托, 信誉, Petri网

Abstract: This paper presents a privilege delegating and access control model for P2P. This model includes three main protocols, such as privilege delegate protocol, resources search protocol, and access control protocol. Privilege delegate protocol defines that the task initiator, PEER_S selects delegated peers PEER_D who will delegate PEER_S to finish tasks with highest trust value, and awards privilege delegation certificate Cd. The resources search protocol defines that PEER_D send resource request to the provider with the highest trust value. The resource access protocol defines the PEER_R access control of resource with the credit certificates Cts and privilege delegation certificate Cd of requesting peers. By CPN Tools, the protocols are simulated based on the characteristics with colored Petri-net, such as reachability.

Key words: P2P, privilege delegation, reputation, Petri nets

中图分类号: