Journal of Computer Applications ›› 2005, Vol. 25 ›› Issue (12): 2731-2733.

• Network and distributed techno • Previous Articles     Next Articles

Implementing access policies with hidden credentials

<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>H<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>O<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>N<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>G<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>F<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>a<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>n<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>,<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>L<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>I<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>U<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a> <a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>L<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>e<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>i<a href="https://www.joca.cn/EN/article/advancedSearchResult.do?searchSQL=((([Author]) AND 1[Journal]) AND year[Order])" target="_blank"></a>   

  1. Institute of Computer Science and Technology,Huazhong University of Science and Technology,Wuhan Hubei 430074,China)
  • Received:1900-01-01 Revised:1900-01-01 Online:2005-12-01 Published:2005-12-01

用隐藏证书实现访问策略

洪帆刘磊   

  1. 华中科技大学计算机科学与技术学院

Abstract: To solve the efficiency problem of useing hidden credentials in trustmanagement system,a scheme using hidden credentials to efficiently implement complex polices with "polices expression" and "final prefix" was presented.The encryption and decipherment times were reduced by constructing and simplifying policy expression,the information restore was guaranteed by useing "final prefix".Example shows that the scheme is feasible and efficiency.

Key words: hidden credentials, access policies, trust negotiation

摘要: 为解决在信任管理系统中使用隐藏证书的效率问题,借助于策略表达式和结束前缀,给出了一种使用隐藏证书有效实现复杂访问策略的方案,通过构造策略表达式并对其化简减少了加密和解密的次数,通过“结束前缀”方便了信息的还原。实例显示该方案具有较好的可行性和效率。

关键词: 隐藏证书, 访问策略, 信任协商

CLC Number: