A semiring privacy protect model

被引:4
作者
Zhang Mingwu [1 ]
Yang Bo [1 ]
Zhang Wenzheng [2 ]
机构
[1] South China Agr Univ, Coll Informat, Guangzhou, Guangdong, Peoples R China
[2] Natl Lab Modern Commun, Chengdu, Peoples R China
来源
2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS | 2007年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/NPC.2007.157
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Trust management systems support the provision of the required levels of assurance in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for establish and verify trust. In this paper, we propose a privacy-protecting trust model, which is based on an ordered semiring framework. In our semiring framework, the credential graph is flexible enough to express trust relationships and it also construct trust model based on privacy protect method. It gives a computing model to describe the trust opinion and privacy opinion, and also provides the minimized privacy disclosure credential search algorithm based on semiring model.
引用
收藏
页码:255 / +
页数:2
相关论文
共 12 条
[1]   A statistical matching approach to detect privacy violation for trust-based collaborations [J].
Ahmed, M ;
Quercia, D ;
Hailes, S .
SIXTH IEEE INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS MOBILE AND MULTIMEDIA NETWORKS, PROCEEDINGS, 2005, :598-602
[2]  
GEVERS S, 2006, LECT NOTES COMPUTER, V4277
[3]  
JOSANG, 2003, P 1 INT WORKSH FORM, P9
[4]   Distributed approximation of fixed-points in trust structures [J].
Krukow, K ;
Twigg, A .
25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2005, :805-814
[5]   Trust-based privacy preservation for peer-to-peer data sharing [J].
Lu, Yi ;
Wang, Weichao ;
Bhargava, Bharat ;
Xu, Dongyan .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03) :498-502
[6]  
MOHRI M, 2002, J AUTOMATA LANGUAGES, V3, P321
[7]  
MURTHY GR, 2006, INT J NETWORK SECURI, V3, P183
[8]  
Sun YL, 2006, IEEE J SEL AREA COMM, V24, P305, DOI [10.1109/JSAC.2005.861389, 10.1109/JSAC.2005.0861389]
[9]   k-anonymity:: A model for protecting privacy [J].
Sweeney, L .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2002, 10 (05) :557-570
[10]   On trust models and trust evaluation metrics for ad hoc networks [J].
Theodorakopoulos, G ;
Baras, JS .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :318-328