CN105429965A - Conflict Resolution Method for Negotiating Trust Rules - Google Patents
Conflict Resolution Method for Negotiating Trust Rules Download PDFInfo
- Publication number
- CN105429965A CN105429965A CN201510742063.9A CN201510742063A CN105429965A CN 105429965 A CN105429965 A CN 105429965A CN 201510742063 A CN201510742063 A CN 201510742063A CN 105429965 A CN105429965 A CN 105429965A
- Authority
- CN
- China
- Prior art keywords
- rule
- tag tree
- certificate
- node
- negotiation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 230000008569 process Effects 0.000 description 9
- 230000014509 gene expression Effects 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000001419 dependent effect Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000010521 absorption reaction Methods 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 239000011159 matrix material Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
技术领域technical field
本发明涉及通信领域,更具体地说,本发明涉及一种协商信任规则的冲突消解方法。The present invention relates to the communication field, and more specifically, the present invention relates to a conflict resolution method for negotiating trust rules.
背景技术Background technique
传统的信任协商中,在协商前并无信任规则冲突检测及消解的过程,协商双方依据各自制定好的协商信任规则直接组织协商。但是,如果信任规则存在冲突,在协商过程中冲突很难被检测和消解,而依据冲突的信任规则组织协商,既浪费了交互的时间,也导致了不必要的隐私暴露。因此,在协商之前进行信任规则冲突检测,并对冲突作一定程度的消解是非常必要的。虽然研究者在冲突检测方面做了较多的工作,例如已经有人试图利用0-1表描述信任规则的方法来检测冲突,但没有提供相关的理论依据和深入研究。另外,也有人提出对信任规则进行线性描述与分析,但这更多是出于理论上的研究,不易应用实现。还有人从算法实施角度提出用矩阵形式描述信任规则并给出了冲突检测算法,但无法根据应用环境等需求进行灵活的变化与扩展。In traditional trust negotiation, there is no process of trust rule conflict detection and resolution before the negotiation, and the negotiating parties directly organize the negotiation according to the negotiated trust rules they have formulated. However, if there is a conflict in the trust rules, it is difficult to detect and resolve the conflict during the negotiation process, and organizing the negotiation based on the conflicting trust rules not only wastes the interaction time, but also leads to unnecessary privacy exposure. Therefore, it is very necessary to detect trust rule conflicts before negotiation and resolve the conflicts to a certain extent. Although researchers have done a lot of work on conflict detection, for example, some people have tried to use the 0-1 table to describe trust rules to detect conflicts, but no relevant theoretical basis and in-depth research have been provided. In addition, some people have proposed a linear description and analysis of trust rules, but this is more for theoretical research and is not easy to implement. From the perspective of algorithm implementation, some people proposed to use matrix form to describe trust rules and gave a conflict detection algorithm, but it cannot be flexibly changed and expanded according to the requirements of the application environment.
总的来看,现有的这些研究都没有证明其冲突检测方法的合理性,也没有给出消解冲突的方法。Generally speaking, none of these existing studies proves the rationality of their conflict detection methods, nor does it provide a method to resolve conflicts.
发明内容Contents of the invention
本发明所要解决的技术问题是针对现有技术中存在上述缺陷,提供一种协商信任规则的冲突消解方法,其能够针对死锁冲突的问题,利用规则约减的方法,一次性披露最小证书集的方法对其进行消解。The technical problem to be solved by the present invention is to provide a conflict resolution method for negotiating trust rules in view of the above-mentioned defects in the prior art, which can solve the problem of deadlock conflicts and use the method of rule reduction to disclose the minimum set of certificates at one time method to resolve it.
为了实现上述技术目的,根据本发明,提供了一种协商信任规则的冲突消解方法,其特征在于包括:In order to achieve the above technical purpose, according to the present invention, a conflict resolution method for negotiating trust rules is provided, which is characterized in that it includes:
第一步骤:建立最小证书集;Step 1: Establish a minimum set of certificates;
第二步骤:将请求方持有的证书集与最小证书集的元素进行匹配;The second step: match the certificate set held by the requesting party with the elements of the minimum certificate set;
第三步骤:如果在最小证书集中找到一个集合元素,使得其包含在请求方持有的证书集中,则判定协商成功,从而协商对方同意请求方的资源访问;Step 3: If a set element is found in the minimum certificate set so that it is included in the certificate set held by the requesting party, it is determined that the negotiation is successful, so that the negotiating party agrees to the resource access of the requesting party;
第四步骤:如果在最小证书集中没有找到一个集合元素,使得其包含在请求方持有的证书集中,则判定协商不成功,从而协商对方拒绝请求方的资源访问。Step 4: If no set element is found in the minimum certificate set so that it is included in the certificate set held by the requesting party, it is determined that the negotiation is unsuccessful, so that the negotiating party refuses the resource access of the requesting party.
优选地,所述最小证书集包括多个元素,其中每个元素是针对协商规则的标签树的相应一条协商路径所必须披露的证书集合。Preferably, the minimum set of certificates includes a plurality of elements, wherein each element is a set of certificates that must be disclosed for a corresponding negotiation path of the label tree of the negotiation rule.
优选地,标签树是一个经过简化的标签树。Preferably, the tag tree is a simplified tag tree.
优选地,标签树的简化规则包括:如果协商规则的一条元规则是真,则遍历整个标签树,在标签树上消去此元规则对应的节点。Preferably, the simplified rules of the label tree include: if a meta-rule of the negotiation rule is true, traverse the entire label tree, and delete the node corresponding to the meta-rule on the label tree.
优选地,标签树的简化规则包括:如果协商规则的一条元规则是假,则消去通过元规则节点到标签树的根节点的所有路径。Preferably, the simplified rules of the label tree include: if a meta-rule of the negotiation rule is false, all paths from the meta-rule node to the root node of the label tree are eliminated.
优选地,标签树的简化规则包括:如果标签树的一条到根节点的路径上有重复的节点,则只保留重复节点中的一个。Preferably, the simplification rules of the label tree include: if there are repeated nodes on a path to the root node of the label tree, only one of the repeated nodes is kept.
优选地,标签树的简化规则包括:依次遍历标签树的每条到根节点的路径,如果找到与其它路径相同的一条路径,则消去该条路径。Preferably, the simplification rule of the label tree includes: traversing each path to the root node of the label tree in turn, and if a path identical to other paths is found, the path is eliminated.
优选地,标签树的简化规则包括:如果标签树的一条到根节点的路径的节点都包含都在另一条路径中,则消去所述另一条路径。Preferably, the simplification rules of the label tree include: if all the nodes of a path to the root node of the label tree are included in another path, then the other path is eliminated.
优选地,标签树的简化规则包括:如果标签树的一条到根节点的路径和另一条路径仅包含相同节点和相反节点,则消去其中一条路径,且删去另一条路径中的相反节点。Preferably, the simplification rules of the label tree include: if a path to the root node and another path of the label tree only contain identical nodes and opposite nodes, one of the paths is deleted, and the opposite node in the other path is deleted.
针对信任协商过程中常会出现自相矛盾、协商死锁、协商无果等现象,信任规则存在冲突是造成这些问题的原因。由此,由于本发明能够对信任规则进行冲突的消解,从而可避免在信任协商过程中使用冲突信任规则而导致的协商失败,从而既节省了协商交互的时间,也避免了不必要的隐私暴露。由此,本发明能够在保护各方隐私的前提下,有效地解决信任关系建立的问题。In the process of trust negotiation, there are often phenomena such as self-contradiction, negotiation deadlock, and negotiation failure. The conflicts in trust rules are the reasons for these problems. Therefore, since the present invention can resolve conflicts of trust rules, it can avoid negotiation failure caused by using conflicting trust rules in the process of trust negotiation, thereby saving negotiation interaction time and avoiding unnecessary privacy exposure . Therefore, the present invention can effectively solve the problem of establishing a trust relationship under the premise of protecting the privacy of all parties.
附图说明Description of drawings
结合附图,并通过参考下面的详细描述,将会更容易地对本发明有更完整的理解并且更容易地理解其伴随的优点和特征,其中:A more complete understanding of the invention, and its accompanying advantages and features, will be more readily understood by reference to the following detailed description, taken in conjunction with the accompanying drawings, in which:
图1示意性地示出了信任规则的标签树描述示例。Fig. 1 schematically shows an example of label tree description of trust rules.
图2示意性地示出了标签树的吸收简化示例。Fig. 2 schematically shows an example of absorption simplification of a tag tree.
图3示意性地示出了标签树的合并简化示例。Fig. 3 schematically shows a simplified example of merging tag trees.
图4示意性地示出了根据本发明实施例的协商信任规则的冲突消解方法的流程图。Fig. 4 schematically shows a flowchart of a conflict resolution method for negotiating trust rules according to an embodiment of the present invention.
需要说明的是,附图用于说明本发明,而非限制本发明。注意,表示结构的附图可能并非按比例绘制。并且,附图中,相同或者类似的元件标有相同或者类似的标号。It should be noted that the accompanying drawings are used to illustrate the present invention, but not to limit the present invention. Note that drawings showing structures may not be drawn to scale. And, in the drawings, the same or similar elements are marked with the same or similar symbols.
具体实施方式detailed description
为了使本发明的内容更加清楚和易懂,下面结合具体实施例和附图对本发明的内容进行详细描述。In order to make the content of the present invention clearer and easier to understand, the content of the present invention will be described in detail below in conjunction with specific embodiments and accompanying drawings.
为了便于理解,下面首先介绍信任规则逻辑描述的基本语法结构。For ease of understanding, the following first introduces the basic grammatical structure of the logical description of trust rules.
信任规则中涉及的语法符号有:The syntax symbols involved in trust rules are:
命题变量:s,c1,c2,…,cn,其中s表示相应的资源,ci表示证书。特别有时s也可以看成是一个证书。Proposition variables: s,c 1 ,c 2 ,…,c n , where s represents the corresponding resource, and ci represents the certificate. Especially sometimes s can also be regarded as a certificate.
命题常量:true、false,分别表示证书可以无条件披露或永远不能披露。Propositional constants: true, false, respectively indicating that the certificate can be disclosed unconditionally or never.
规则体内连接词:∧、∨、表示证书变量之间的逻辑与、或、反操作。Connectives in the body of the rule: ∧, ∨, Represents a logical AND, OR, and inverse operation between certificate variables.
左右括号:(、)。Left and right brackets: (,).
资源与规则体的依赖操作符号:←,表示满足规则体的证书要求则披露资源的依赖操作。Dependent operation symbols of resource and rule body: ←, which means that if the certificate requirements of the rule body are met, the dependent operation of the resource is disclosed.
由此,信任规则的逻辑描述方法的基本语法结构如下:对于资源s,相应的信任规则ps可表示为如下形式:s←fs(c1,c2,…,cn),其中fs(c1,c2,…,cn)是包含信任证书c1,c2,…,cn,布尔常量true、false,布尔运算符∧、∨、以及括号的表达式。←的语义是:若协商对方满足条件fs(c1,c2,…,cn),即披露了要求的证书,则认为s←fs(c1,c2,…,cn)成立,即可以成功共享资源s。Therefore, the basic grammatical structure of the logical description method of trust rules is as follows: for a resource s, the corresponding trust rules p s can be expressed as follows: s←f s (c 1 ,c 2 ,…,c n ), where f s (c 1 ,c 2 ,…,c n ) is the trust certificate c 1 ,c 2 ,…,c n , Boolean constants true, false, Boolean operators ∧, ∨, and parenthesized expressions. The semantics of ← is: if the negotiating party satisfies the condition f s (c 1 ,c 2 ,…,c n ), that is, discloses the required certificate, then it is considered that s←f s (c 1 ,c 2 ,…,c n ) Established, that is, the resource s can be successfully shared.
另外,若存在形如C←B、B←A的两条信任规则,则根据逻辑原理,可以推出C←A成立。In addition, if there are two trust rules in the form of C←B and B←A, then according to logical principles, it can be deduced that C←A is established.
因此,s←fs(c1,c2,…,cn)表示当且仅当对方披露了信任证书c1,c2,…,cn,本地信任证书s才能被披露。特别地,信任规则s←true表示信任证书s无需信任规则保护,可以无条件地披露给任何协商者。相反地,信任规则s←false表示信任证书s在任何情况下都不能被披露。Therefore, s←f s (c 1 ,c 2 ,…,c n ) means that the local trust certificate s can be disclosed if and only if the other party discloses the trust certificate c 1 ,c 2 ,…,c n . In particular, the trust rule s←true means that the trust certificate s does not need to be protected by trust rules and can be unconditionally disclosed to any negotiator. Conversely, the trust rule s←false means that the trust certificate s cannot be disclosed under any circumstances.
存在如下若干信任规则逻辑命题的真值刻画:There are several truth characterizations of logical propositions of trust rules as follows:
①永真式(重言式):即若fs(c1,c2,…,cn)≡1,则规则体fs(c1,c2,…,cn)是永真式(重言式);①Eternal truth form (tattoo form): that is, if f s (c 1 ,c 2 ,…,c n )≡1, then the regular body f s (c 1 ,c 2 ,…,c n ) is an eternal truth form (tautology);
②永假式(矛盾式):即若fs(c1,c2,…,cn)≡0,则规则体fs(c1,c2,…,cn)是永假式(矛盾式);②Permanent form (contradiction): If f s (c 1 ,c 2 ,…,c n )≡0, then the rule body f s (c 1 ,c 2 ,…,c n ) is a perpetual form ( contradictory);
③或然式:当证书c1,c2,…,cn分别采取不同的赋值时,fs(c1,c2,…,cn)可能取值1,也可能取值0,则规则体fs(c1,c2,…,cn)是或然式;③Contingency formula: when the certificates c 1 , c 2 ,…,c n take different assignments respectively, f s (c 1 ,c 2 ,…,c n ) may take the value 1 or 0, then Regular body f s (c 1 ,c 2 ,…,c n ) is a probabilistic formula;
④可满足式:当至少有一个c1,c2,…,cn赋值组合,使得fs(c1,c2,…,cn)的值为真时,称此赋值{ci=0或1|1≤i≤n}为逻辑表达式fs(c1,c2,…,cn)的解,表达式fs(c1,c2,…,cn)是可满足的。④Satisfiable formula: when there is at least one assignment combination of c 1 ,c 2 ,…,c n making the value of f s (c 1 ,c 2 ,…,c n ) true, the assignment { ci = 0 or 1|1≤i≤n} is the solution of the logical expression f s (c 1 ,c 2 ,…,c n ), and the expression f s (c 1 ,c 2 ,…,c n ) is satisfiable of.
由前述可知,信任规则可视作一个个逻辑命题,其中信任达成规则是关键的命题,它与信任中间规则等构成了一个逻辑系统。显然,在这个逻辑系统中,可以进行信任规则的逻辑性质,如等价性、协调性、可满足性等的分析。From the foregoing, we can see that trust rules can be regarded as logical propositions, among which the trust achievement rule is the key proposition, and it forms a logical system with trust intermediate rules. Obviously, in this logical system, the logical properties of trust rules, such as equivalence, coordination, and satisfiability, can be analyzed.
在分析信任规则的逻辑性质过程中,可能会用到一些逻辑推演的准则。不妨假设对于信任规则s←ci(1≤i≤n),它们之间的逻辑运算的推演准则列举如下:In the process of analyzing the logical nature of trust rules, some principles of logical deduction may be used. It may be assumed that for trust rules s←c i (1≤i≤n), the deduction criteria for logical operations between them are listed as follows:
(L1):(s←c1)∧(s←c2)=(s←c1∧c2)(L1):(s←c 1 )∧(s←c 2 )=(s←c 1 ∧c 2 )
(L2):(s←c1)∨(s←c2)=(s←c1∨c2)(L2): (s←c 1 )∨(s←c 2 )=(s←c 1 ∨c 2 )
(L3):(s←c1)∨((s←c1)∧(s←c2))=(s←c1)(L3): (s←c 1 )∨((s←c 1 )∧(s←c 2 ))=(s←c 1 )
(L4):(s←c1)∨(s←false)=(s←c1)(L4): (s←c 1 )∨(s←false)=(s←c 1 )
(L5):(s←c1)∧(s←true)=(s←c1)(L5): (s←c 1 )∧(s←true)=(s←c 1 )
(L6):(s←c1)∨(s←true)=s←true(L6): (s←c 1 )∨(s←true)=s←true
(L7):(s←c1)∧(s←false)=s←false(L7): (s←c 1 )∧(s←false)=s←false
(L8):(s←c1)∧(s←c2)=(s←c2)∧(s←c1)(L8): (s←c 1 )∧(s←c 2 )=(s←c 2 )∧(s←c 1 )
(L9):(s←c1)∨(s←c2)=(s←c2)∨(s←c1)(L9): (s←c 1 )∨(s←c 2 )=(s←c 2 )∨(s←c 1 )
(L10):(s←c1)∧((s←c2)∨(s←c3))=(s←c1∧c2)∨(s←c1∧c3)(L10): (s←c 1 )∧((s←c 2 )∨(s←c 3 ))=(s←c 1 ∧c 2 )∨(s←c 1 ∧c 3 )
(L11):(s←c1)∨((s←c2)∧(s←c3))=(s←c1∨c2)∧(s←c1∨c3)(L11): (s←c 1 )∨((s←c 2 )∧(s←c 3 ))=(s←c 1 ∨c 2 )∧(s←c 1 ∨c 3 )
(L12): (L12):
(L13): (L13):
(L14): (L14):
<信任规则死锁冲突><trust rule deadlock violation>
假设CA和CB分别表示资源请求方A和资源提供方B的证书集,PA和PB分别表示A方和B方的信任规则集,协商过程由请求方A对资源或服务s∈CB的请求开始,如果协商双方具有如下信任规则,pci:ci←gci(sj)和psj:sj←hsj(ci),其中ci、sj分别是协商方A和B所持有的证书,pci、psj分别是包含证书ci、sj的信任规则,gci(sj)表示包含证书sj的逻辑表达式,hsj(ci)表示包含证书ci的逻辑表达式,则称信任规则pci、psj存在死锁冲突。Assume that C A and C B represent the certificate sets of resource requester A and resource provider B respectively, and PA and P B represent the trust rule sets of party A and party B respectively. In the negotiation process, the resource or service s∈ C B 's request starts, if the negotiating parties have the following trust rules, p ci :ci ←g ci (s j ) and p sj : s j ←h sj (ci ), where ci and s j are negotiating parties For the certificates held by A and B, p ci and p sj are trust rules containing certificates ci and s j respectively, g ci (s j ) represents a logical expression containing certificate s j , h sj ( ci ) represents If the logical expression contains the certificate ci , it is said that there is a deadlock conflict in the trust rules p ci and p sj .
为了方便对信任规则的化简,本节先将信任规则表示成析取范式,再用规则标签树(ACP-LTree)描述如下:In order to facilitate the simplification of the trust rules, this section first expresses the trust rules as a disjunctive paradigm, and then uses the rule label tree (ACP-LTree) to describe as follows:
每一个标签树的根节点表示信任规则中欲访问的资源,其它节点表示信任规则中要求披露的证书。每一条由叶子节点到达根节点的路径中包含的非根节点构成集合表示访问资源、建立信任所必须披露的属性证书的集合。The root node of each label tree represents the resources to be accessed in the trust rules, and other nodes represent the certificates required to be disclosed in the trust rules. Each non-root node contained in the path from the leaf node to the root node constitutes a set representing the set of attribute certificates that must be disclosed for accessing resources and establishing trust.
例如,信任规则s←(c1∧c2)∨(c3∧c4)∨(c3∧c5∧c6)∨(c7∧c8)可表示成如图1所示的标签树。若欲访问s,则至少应满足标签树中的一条叶子到根节点的路径所包含的证书要求,即披露证书集{c1,c2},{c3,c4},{c3,c5,c6}或{c7,c8}之一,才能访问资源s。For example, the trust rule s←(c 1 ∧c 2 )∨(c 3 ∧c 4 )∨(c 3 ∧c 5 ∧c 6 )∨(c 7 ∧c 8 ) can be expressed as a label as shown in Figure 1 Tree. If you want to access s, you should at least meet the certificate requirements contained in the path from a leaf to the root node in the label tree, that is, the disclosure certificate set {c 1 ,c 2 },{c 3 ,c 4 },{c 3 , c 5 ,c 6 } or {c 7 ,c 8 } to access resource s.
对标签树表示的信任规则进行化简可以遵循的规则如下:The rules that can be followed to simplify the trust rules represented by the label tree are as follows:
(1)若某元规则是真(true,表示证书可以无条件披露),遍历整个树,在树上消去此规则对应的节点;(1) If a meta-rule is true (true, indicating that the certificate can be disclosed unconditionally), traverse the entire tree and delete the node corresponding to this rule on the tree;
(2)若某元规则是假(false,表示永远不能披露),则消去通过该节点到达根节点的所有路径(包括边);(2) If a certain meta-rule is false (false, indicating that it can never be disclosed), then eliminate all paths (including edges) passing through the node to the root node;
(3)若一条到根节点的路径上有重复的节点,则只保留一个,消去其它重复的节点;(3) If there are duplicate nodes on a path to the root node, only one is kept, and other duplicate nodes are eliminated;
(4)依次遍历每条到根节点的路径,如果找到与其相同的一条路径,则消去该路径;(4) Traverse each path to the root node in turn, if a path identical to it is found, then eliminate the path;
(5)若一条到根节点的路径,其节点都包含都在另一条路径中,则消去另一条路径,如图2所示;(5) If a path to the root node, its nodes are all included in another path, then eliminate another path, as shown in Figure 2;
(6)若一条到根节点的路径,和另一条路径有相同的节点和相反的节点,则消去其中一条路径,且另一条路径删去其中相反节点(符号“”表示节点取反),如图3所示。(6) If a path to the root node has the same node and the opposite node as another path, one of the paths is eliminated, and the opposite node is deleted from the other path (symbol " ” means node inversion), as shown in Figure 3.
<最小证书集><minimum certificate set>
信任协商中,达成协商成功的协商路径可能有n条,依据其中第i(1≤i≤n)条路径进行协商,资源请求方欲访问对方的目标资源、建立信任,至少需要披露的证书集合记为{ci,…},则以{ci,…}作元素构成的集合称最小证书集,记作{{ci,…},…}。In trust negotiation, there may be n negotiation paths to achieve successful negotiation, and the negotiation is carried out according to the i-th (1≤i≤n) path. If the resource requester wants to access the target resource of the other party and establish trust, at least the set of certificates that need to be disclosed denoted as {c i ,…}, then the set composed of {c i ,…} as elements is called the minimum certificate set, denoted as {{c i ,…},…}.
当一个信任规则被描述成标签树的形式,按照约简规则对其约减后,每一条由叶子节点到根节点的路径中所包含的非根节点就是最小证书集的一个元素,所有这些元素构成了满足此规则的最小证书集CM。When a trust rule is described in the form of a label tree, after it is reduced according to the reduction rule, the non-root node contained in each path from the leaf node to the root node is an element of the minimum certificate set, and all these elements constitutes the minimum set of certificates C M satisfying this rule.
<冲突消解><conflict resolution>
有了最小证书集,可以借助一次性披露最小证书集的方法来消解信任规则死锁冲突。信任协商过程中,根据证书与信任规则匹配算法,检测请求方是否持有最小证书集要求的证书,从而判断协商是否可以直接达成成功。其方法如下:With the minimum certificate set, the deadlock conflict of trust rules can be resolved by the method of one-time disclosure of the minimum certificate set. During the trust negotiation process, according to the certificate and trust rule matching algorithm, it is detected whether the requesting party holds the certificate required by the minimum certificate set, so as to judge whether the negotiation can be directly successful. The method is as follows:
根据证书与信任规则匹配算法,请求方A将自己持有的证书集CA拿来分别与最小证书集CM的元素匹配,如果且即在CM中能够找到一个集合元素,使得其包含在CA中,则一次性披露最小证书集所要求的证书,达成协商成功,不需要再通过多步的协商步骤披露其它敏感信息。否则,请求方A不具备对方的协商要求,协商对方拒绝请求方的资源访问。可见,通过一次性地证书匹配,即可达成协商结果,一方面可以提高协商效率和成功率,另一方面也可以解决逐步披露证书过程中,可能造成的证书循环依赖的死锁问题。According to the certificate and trust rule matching algorithm, the requester A uses the certificate set C A held by itself to match the elements of the minimum certificate set C M , if and That is, if a set element can be found in C M so that it is included in CA, then the certificate required by the minimum certificate set is disclosed at one time, and the negotiation is successful, and there is no need to disclose other sensitive information through multi-step negotiation steps. Otherwise, the requesting party A does not meet the negotiating requirements of the other party, and the negotiating party rejects the resource access of the requesting party. It can be seen that the negotiation result can be reached through one-time certificate matching. On the one hand, it can improve the negotiation efficiency and success rate, and on the other hand, it can also solve the deadlock problem of certificate circular dependence that may be caused in the process of gradually disclosing certificates.
相应地,图4示意性地示出了根据本发明实施例的协商信任规则的冲突消解方法的流程图。Correspondingly, FIG. 4 schematically shows a flowchart of a conflict resolution method for negotiating trust rules according to an embodiment of the present invention.
如图4所示,根据本发明实施例的协商信任规则的冲突消解方法包括:As shown in FIG. 4, the conflict resolution method for negotiating trust rules according to an embodiment of the present invention includes:
第一步骤S1:建立最小证书集;其中所述最小证书集包括多个元素,其中每个元素是针对协商规则的标签树的相应一条协商路径所必须披露的证书集合。The first step S1: establishing a minimum certificate set; wherein the minimum certificate set includes a plurality of elements, wherein each element is a set of certificates that must be disclosed for a corresponding negotiation path of the label tree of the negotiation rule.
第二步骤S2:将请求方持有的证书集与最小证书集的元素进行匹配;The second step S2: matching the certificate set held by the requesting party with the elements of the minimum certificate set;
第三步骤S3:如果在最小证书集中找到一个集合元素,使得其包含在请求方持有的证书集中,则判定协商成功,从而协商对方同意请求方的资源访问;The third step S3: If a set element is found in the minimum certificate set so that it is included in the certificate set held by the requesting party, it is determined that the negotiation is successful, so that the negotiating party agrees to the resource access of the requesting party;
第四步骤S4:如果在最小证书集中没有找到一个集合元素,使得其包含在请求方持有的证书集中,则判定协商不成功,从而协商对方拒绝请求方的资源访问。Fourth step S4: If no set element is found in the minimum certificate set, so that it is included in the certificate set held by the requesting party, it is determined that the negotiation is unsuccessful, so that the negotiating party rejects the resource access of the requesting party.
在本发明中,通过一次性披露最小证书集的方法,可避免在协商中使用死锁信任规则,从而间接地对死锁冲突进行了消解。对信任规则进行死锁冲突的消解,可避免在信任协商过程中使用冲突信任规则而导致的协商失败。提出的协商信任规则冲突消解方法,符合实际需要,可以在自动信任协商中,保护各方隐私的前提下,有效地解决信任关系建立的问题。对于开放网络环境下,提供信任保障和支持资源安全共享具有理论和应用意义。In the present invention, by disclosing the minimum certificate set at one time, the use of deadlock trust rules in negotiation can be avoided, thereby indirectly resolving deadlock conflicts. Resolving deadlock conflicts in trust rules can avoid negotiation failures caused by using conflicting trust rules in the process of trust negotiation. The proposed conflict resolution method of negotiated trust rules meets the actual needs, and can effectively solve the problem of trust relationship establishment under the premise of protecting the privacy of all parties in automatic trust negotiation. For the open network environment, it has theoretical and practical significance to provide trust guarantee and support resource security sharing.
<证书与信任规则匹配算法的程序示例><Program example of certificate and trust rule matching algorithm>
为了便于本领域技术人员实施本发明,下面给出证书与信任规则匹配算法程序“credencialPolicyMatch”的一个具体示例。In order to facilitate those skilled in the art to implement the present invention, a specific example of the certificate and trust rule matching algorithm program "credencialPolicyMatch" is given below.
此外,需要说明的是,除非特别说明或者指出,否则说明书中的术语“第一”、“第二”、“第三”等描述仅仅用于区分说明书中的各个组件、元素、步骤等,而不是用于表示各个组件、元素、步骤之间的逻辑关系或者顺序关系等。In addition, it should be noted that, unless otherwise specified or pointed out, the terms “first”, “second”, “third” and other descriptions in the specification are only used to distinguish each component, element, step, etc. in the specification, and It is not used to represent the logical relationship or sequential relationship between various components, elements, and steps.
可以理解的是,虽然本发明已以较佳实施例披露如上,然而上述实施例并非用以限定本发明。对于任何熟悉本领域的技术人员而言,在不脱离本发明技术方案范围情况下,都可利用上述揭示的技术内容对本发明技术方案作出许多可能的变动和修饰,或修改为等同变化的等效实施例。因此,凡是未脱离本发明技术方案的内容,依据本发明的技术实质对以上实施例所做的任何简单修改、等同变化及修饰,均仍属于本发明技术方案保护的范围内。It can be understood that although the present invention has been disclosed above with preferred embodiments, the above embodiments are not intended to limit the present invention. For any person skilled in the art, without departing from the scope of the technical solution of the present invention, the technical content disclosed above can be used to make many possible changes and modifications to the technical solution of the present invention, or be modified to be equivalent to equivalent changes. Example. Therefore, any simple modifications, equivalent changes and modifications made to the above embodiments according to the technical essence of the present invention, which do not deviate from the technical solution of the present invention, still fall within the protection scope of the technical solution of the present invention.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510742063.9A CN105429965A (en) | 2015-11-04 | 2015-11-04 | Conflict Resolution Method for Negotiating Trust Rules |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510742063.9A CN105429965A (en) | 2015-11-04 | 2015-11-04 | Conflict Resolution Method for Negotiating Trust Rules |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105429965A true CN105429965A (en) | 2016-03-23 |
Family
ID=55507907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510742063.9A Pending CN105429965A (en) | 2015-11-04 | 2015-11-04 | Conflict Resolution Method for Negotiating Trust Rules |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105429965A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108090803A (en) * | 2017-12-06 | 2018-05-29 | 上海电机学院 | A kind of negotiation degree of belief computational methods |
CN114021857A (en) * | 2021-12-03 | 2022-02-08 | 武汉绿色网络信息服务有限责任公司 | Agent-based self-trust negotiation prediction method, system and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101339591A (en) * | 2008-08-29 | 2009-01-07 | 中国科学院软件研究所 | A method for detecting XACML policy rules |
US20090040020A1 (en) * | 2007-08-08 | 2009-02-12 | Secerno Ltd. | Method, computer program and apparatus for controlling access to a computer resource |
CN101512505A (en) * | 2006-09-11 | 2009-08-19 | 微软公司 | Security language translations with logic resolution |
CN101778111A (en) * | 2010-01-21 | 2010-07-14 | 北京航空航天大学 | Automatic trust establishing method for resource security protection and system thereof |
US8938783B2 (en) * | 2006-09-11 | 2015-01-20 | Microsoft Corporation | Security language expressions for logic resolution |
-
2015
- 2015-11-04 CN CN201510742063.9A patent/CN105429965A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101512505A (en) * | 2006-09-11 | 2009-08-19 | 微软公司 | Security language translations with logic resolution |
US8938783B2 (en) * | 2006-09-11 | 2015-01-20 | Microsoft Corporation | Security language expressions for logic resolution |
US20090040020A1 (en) * | 2007-08-08 | 2009-02-12 | Secerno Ltd. | Method, computer program and apparatus for controlling access to a computer resource |
CN101339591A (en) * | 2008-08-29 | 2009-01-07 | 中国科学院软件研究所 | A method for detecting XACML policy rules |
CN101778111A (en) * | 2010-01-21 | 2010-07-14 | 北京航空航天大学 | Automatic trust establishing method for resource security protection and system thereof |
Non-Patent Citations (2)
Title |
---|
廖振松: "虚拟组织中自动信任协商研究", 《万方数据知识服务平台》 * |
汪楠,夏冬梅: "一种基于博弈的自动信任协商模型", 《合肥师范学院学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108090803A (en) * | 2017-12-06 | 2018-05-29 | 上海电机学院 | A kind of negotiation degree of belief computational methods |
CN114021857A (en) * | 2021-12-03 | 2022-02-08 | 武汉绿色网络信息服务有限责任公司 | Agent-based self-trust negotiation prediction method, system and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190362087A1 (en) | Hybrid role and attribute based access control system | |
WO2020081240A1 (en) | Multi-tenant authorization | |
US20190364051A1 (en) | Organization based access control system | |
KR101448319B1 (en) | Security Language Conversion Method and Assertion Context Authorization System | |
CN103745161A (en) | Method and device for controlling access security | |
CN103312722A (en) | Control design method for fine-grained mandatory access | |
US11757886B2 (en) | Analysis of role reachability using policy complements | |
CN102045158B (en) | Concealed channel identification method | |
CN105429965A (en) | Conflict Resolution Method for Negotiating Trust Rules | |
Lopes et al. | A logic programming approach for access control over RDF | |
GB2632201A (en) | Analysis of role reachability with transitive tags | |
US12034727B2 (en) | Analysis of role reachability with transitive tags | |
US12072999B2 (en) | Correctness-preserving security for graph databases | |
Arioua et al. | Query failure explanation in inconsistent knowledge bases using argumentation | |
CN105469146A (en) | Negotiation trust rule conflict detection method | |
WO2017061901A1 (en) | System and method for processing graph data | |
Schmidt | Interval stabbing problems in small integer ranges | |
CN101778111B (en) | Automatic trust establishing method for resource security protection and system thereof | |
US20150286932A1 (en) | Leveraging unique object references to enhance performance of rete-based rule engines | |
CN109670339A (en) | The access control method and device towards secret protection based on ontology | |
CN107547549A (en) | A kind of access control policy optimization method | |
CN107679099B (en) | Access control element graph construction method, policy description method, access control determination method and framework | |
Rosyida et al. | On construction of fuzzy chromatic number of cartesian product of path and other fuzzy graphs | |
US20240314134A1 (en) | Analysis of role reachability with transitive tags | |
CN105426968A (en) | Negotiation trust rule logic property analyzing and processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160323 |
|
RJ01 | Rejection of invention patent application after publication |