Netinfo Security ›› 2015, Vol. 15 ›› Issue (10): 14-23.doi: 10.3969/j.issn.1671-1122.2015.10.003

Previous Articles     Next Articles

The Model of Network Access Based on Trust Evaluation

LI Jian1,2(), GUAN Wei-li3, LIU Ji-qiang1, WU Xing3   

  1. 1. Research Center of Information Security Architecture of Beijing Jiao Tong University, Beijing 100044, China
    2. Institute of Information Security of Nanning College, Nanning Guangxi 530200, China
    3. School of Information Engineering of Nanning college, Nanning Guangxi 530200, China
  • Received:2015-08-01 Online:2015-10-01 Published:2015-11-04

Abstract:

Sometimes users have to access the service which beyond of the domain and different identity domains. In the user-centric identity management infrastructure, due to the service provider has not set up direct relationship with the identity provider, the user summit his or her own identity and certificates when they access the service provider, the service provider must carry out trust measurement to the identity provider. To meet the requirement, the model of network access based on the trust evaluation is put forward, parallel and sequence digital multi-signature scheme are used for trust vote respectively, according to the result of trust evaluation, the service provider determines whether or not accept the user’s certificate and provide service for the user. By trust evaluation, the identity information of different system is related, to achieve the use of a small amount of information access to more network services,. The security analysis shows that the model can resist multiple-attacks effectively.

Key words: identity management, trust evaluation, digital multi-signature algovithm, network access, security analysis

CLC Number: