The Model of Network Access Based on Trust Evaluation

Jian LI,Wei-li GUAN,Ji-qiang LIU,Xing WU
DOI: https://doi.org/10.3969/j.issn.1671-1122.2015.10.003
2015-01-01
Abstract:Sometimes users have to access the service which beyond of the domain and different identity domains. In the user-centric identity management infrastructure, due to the service provider has not set up direct relationship with the identity provider, the user summit his or her own identity and certiifcates when they access the service provider, the service provider must carry out trust measurement to the identity provider. To meet the requirement, the model of network access based on the trust evaluation is put forward, parallel and sequence digital multi-signature scheme are used for trust vote respectively, according to the result of trust evaluation, the service provider determines whether or not accept the user’s certiifcate and provide service for the user. By trust evaluation, the identity information of different system is related, to achieve the use of a small amount of information access to more network services,. The security analysis shows that the model can resist multiple-attacks effectively.
What problem does this paper attempt to address?