Review of Key-Based Dynamic Trust Authorization Mechanism

This paper includes the theory developments and main characteristics of Policymaker, KeyNote, REFEREE, and SPKI/SDSI2.0 Key-Based Dynamic Trust Authorization Mechanisms in distributed environments; discusses the applications and existing security problems of cloud computer and mobile computer Key-Based Dynamic Trust Mechanisms in new distributed environment; describes the role that trust degree plays in solving the security problems of Dynamic Trust Mechanism in new distributed environments, and indicates Certificateless Public Key Cryptography is another development direction for Dynamic Trust Mechanism.

[1]  Tang Yi-wei Multilayer and grouping P2P trust model based on global reputation , 2007 .

[2]  Xiao-Yong Li,et al.  Cognitive Model of Dynamic Trust Forecasting: Cognitive Model of Dynamic Trust Forecasting , 2010 .

[3]  Sarvapali D. Ramchurn,et al.  Trust evaluation through relationship analysis , 2005, AAMAS '05.

[4]  Lang Bo Trust Delegation and Discovery Method , 2011 .

[5]  Dean Povey,et al.  Developing Electronic Trust Policies Using a Risk Management Model , 1999, CQRE.

[6]  Liusheng Huang,et al.  Dynamic Trust Evaluation Model Under Distributed Computing Environment: Dynamic Trust Evaluation Model Under Distributed Computing Environment , 2011 .

[7]  Zhu You Dynamic Trust Evaluation Model Under Distributed Computing Environment , 2011 .

[8]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[9]  Joan Feigenbaum,et al.  The KeyNote Trust-Management System , 1998 .

[10]  Li Xiao Cognitive Model of Dynamic Trust Forecasting , 2010 .

[11]  Luo Jun Trust Degree Based Inter-Domain Routing Mechanism , 2010 .

[12]  Ronald L. Rivest,et al.  SDSI - A Simple Distributed Security Infrastructure , 1996 .

[13]  Zhang Lei,et al.  Research on Certificateless Public Key Cryptography , 2011 .

[14]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[15]  Sun Meifeng,et al.  KeyNote Trust Management System , 2002 .

[16]  Jean-Emile Elien,et al.  Certificate discovery using SPKI/SDSI 2.0 certificates , 1998 .

[17]  Carlton R. Davis A localized trust management scheme for ad hoc networks , 2004 .

[18]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[19]  Ronald L. Rivest,et al.  Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..

[20]  Robert S. Leiken,et al.  A User’s Guide , 2011 .