首页--工业技术论文--自动化技术、计算机技术论文--计算技术、计算机技术论文--计算机的应用论文--计算机网络论文--一般性问题论文

Research on Multi-Negotiation Targets in ATN over TrustBuilder2Framework

摘要第5-6页
Abstract第6-7页
Chapter 1 Introduction第10-20页
    1.1 Background and Significance of Research第10-11页
    1.2 Current Research Status of ATN in China and Abroad第11-17页
        1.2.1 Summary of ATN Protocols第11-14页
        1.2.2 Summary of ATN Strategies第14-15页
        1.2.3 Summary of ATN Frameworks第15-17页
    1.3 Contents and Structure of Dissertation第17-20页
Chapter 2 The Essential Requirements for ATN Environment第20-28页
    2.1 Digital Credentials第20页
    2.2 Credential Chains第20-21页
    2.3 Access Control Policies (ACP)第21-22页
    2.4 Negotiation Protocols第22-24页
    2.5 Negotiation Strategies第24-25页
    2.6 Performance Parameters of ATN systems第25-26页
    2.7 Summary第26-28页
Chapter 3 Improvements of The Existing ATN Protocols and Strategies第28-44页
    3.1 Analysis of The Existing ATN Protocols and Strategies第28-31页
        3.1.1 The Duplicate Disclosures第28-31页
        3.1.2 The Sequential Outcomes第31页
    3.2 Descriptions of The Combined ATN Protocol and Strategy第31-37页
        3.2.1 The Common Disclosure (CD)第32-33页
        3.2.2 Redefinition of Messages第33页
        3.2.3 Modifications of TrustBuilder Protocol1第33-36页
        3.2.4 Modifications of TrustBuilder1-Relevant Strategy第36-37页
    3.3 Trials of The Combined ATN Approach第37-41页
        3.3.1 Non-Simultaneously Combined ATN第38-40页
        3.3.2 Simultaneously Combined ATN第40-41页
    3.4 Summary第41-44页
Chapter 4 Analysis and Modifications of TrustBuilder2 Framework第44-56页
    4.1 TrustBuilder2 Framework Architecture Overview第44-46页
        4.1.1 Description of Data types第44-45页
        4.1.2 Description of Data flow第45-46页
    4.2 The CLOUSEAU Compliance Checker第46-48页
        4.2.1 Representation of Objects第47-48页
        4.2.2 Representation of Policies第48页
    4.3 Examinations of Configuration Files第48-50页
        4.3.1 Description of Profile Loader Files第48-49页
        4.3.2 Description of Policy Loader Files第49-50页
        4.3.3 Description of The Negotiation Target Mapfile第50页
    4.4 Implementations of The Combined ATN over TrustBuilder2 Framework第50-55页
        4.4.1 Association of The Common Disclosure with TrustBuilder2 Framework第50-52页
        4.4.2 Redefinition of Messages in TrustBuilder2 Framework第52-55页
    4.5 Summary第55-56页
Chapter 5 Experiments and Results Analysis第56-66页
    5.1 The Scenario第56-61页
        5.1.1 Definition of Susan Jones’ Credentials and Policies第56-59页
        5.1.2 Definition of Busey Hospital’s Credentials and Policies第59-61页
    5.2 The Experiments第61-62页
    5.3 Results and Analysis第62-65页
    5.4 Summary第65-66页
Conclusion第66-68页
References第68-71页
Publication第71-72页
Acknowledgements第72页

论文共72页,点击 下载论文
上一篇:彩云阁:基于用户模型的服务组合平台
下一篇:面向任务管理的环境运营平台的设计与实现