Research Article
A Survey of Trusted Network Trust Evaluation Methods
229 downloads
@INPROCEEDINGS{10.1007/978-3-030-21373-2_8, author={An-Sheng Yin and Shun-Yi Zhang}, title={A Survey of Trusted Network Trust Evaluation Methods}, proceedings={Security and Privacy in New Computing Environments. Second EAI International Conference, SPNCE 2019, Tianjin, China, April 13--14, 2019, Proceedings}, proceedings_a={SPNCE}, year={2019}, month={6}, keywords={Trusted network Trust evaluation Trust model}, doi={10.1007/978-3-030-21373-2_8} }
- An-Sheng Yin
Shun-Yi Zhang
Year: 2019
A Survey of Trusted Network Trust Evaluation Methods
SPNCE
Springer
DOI: 10.1007/978-3-030-21373-2_8
Abstract
The proposed trusted network is respond to the increasingly prominent internal network security threats. At present, research on trusted networks focuses on two aspects: pre-network access check and dynamic evaluation after access. The pre-access check considers the integrity of the terminal and uses encryption and authentication methods to achieve it. The dynamic evaluation uses the static and dynamic attributes of the trust to implement trust evaluation.
Copyright © 2019–2024 ICST