Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13–14, 2019, Proceedings

Research Article

A Survey of Trusted Network Trust Evaluation Methods

Download
153 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-21373-2_8,
        author={An-Sheng Yin and Shun-Yi Zhang},
        title={A Survey of Trusted Network Trust Evaluation Methods},
        proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings},
        proceedings_a={SPNCE},
        year={2019},
        month={6},
        keywords={Trusted network Trust evaluation Trust model},
        doi={10.1007/978-3-030-21373-2_8}
    }
    
  • An-Sheng Yin
    Shun-Yi Zhang
    Year: 2019
    A Survey of Trusted Network Trust Evaluation Methods
    SPNCE
    Springer
    DOI: 10.1007/978-3-030-21373-2_8
An-Sheng Yin1,*, Shun-Yi Zhang1
  • 1: Nanjing University of Posts and Telecommunications
*Contact email: 16629797@qq.com

Abstract

The proposed trusted network is respond to the increasingly prominent internal network security threats. At present, research on trusted networks focuses on two aspects: pre-network access check and dynamic evaluation after access. The pre-access check considers the integrity of the terminal and uses encryption and authentication methods to achieve it. The dynamic evaluation uses the static and dynamic attributes of the trust to implement trust evaluation.