Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2012, Vol. 29 ›› Issue (1): 109-117.DOI: 10.7523/j.issn.2095-6134.2012.1.016

• Research Articles • Previous Articles     Next Articles

Backword credential chain discovery algorithm based on trust worthiness and parameterized constraints

CHEN Bo1, XI Jing1, YE Yong1, LI Ming-Chu2   

  1. 1. Software School, University of Science and Technology of China, Suzhou 215123, Jiangsu, China;
    2. Software School, Dalian University of Technology, Dalian 116621, Liaoning, China
  • Received:2010-10-19 Revised:2011-03-03 Online:2012-01-15

Abstract:

We propose an algorithm which combines parameterized constraints and trust worthiness. Simulation results show that the algorithm can effectively shield the requests from the undesirable entities, achieving the fine grit authorization in a rather flexible way. Simultaneously, this algorithm enhances the computing efficiency and reduces the space for building the credential chains.

Key words: trust management, credential chain, trust worthiness, parametrization

CLC Number: