METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
    1.
    发明申请
    METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS 审中-公开
    无线传感器网络信任管理方法

    公开(公告)号:US20090328148A1

    公开(公告)日:2009-12-31

    申请号:US12178722

    申请日:2008-07-24

    IPC分类号: G06F21/00 G06F17/11

    CPC分类号: H04L63/12 H04L67/12

    摘要: The present invention relates to Group-based trust management scheme (GTMS) of wireless sensor networks. GTMS evaluates the trust of a group of sensor nodes in contrast to traditional trust management schemes that always focused on trust values of individual nodes. This approach gives us the benefit of requiring less memory to store trust records at each sensor node in the network. It uses the clustering attributes of wireless sensor networks that drastically reduce the cost associated with trust evaluation of distant nodes. Uniquely it provides not only a mechanism to detect malicious or faulty nodes, but also provides some degree of a prevention mechanism.

    摘要翻译: 本发明涉及无线传感器网络的基于组的信任管理方案(GTMS)。 与传统的信任管理方案相比,GTMS评估了一组传感器节点的信任,而传统的信任管理方案始终侧重于各个节点的信任值。 这种方法为我们带来了在网络中每个传感器节点需要较少内存来存储信任记录的好处。 它使用无线传感器网络的聚类属性,大大降低了与远程节点的信任评估相关的成本。 它独特地提供了一种检测恶意节点或故障节点的机制,还提供了一定程度的预防机制。

    Validation of consistency and completeness of access control policy sets
    2.
    发明授权
    Validation of consistency and completeness of access control policy sets 有权
    验证访问控制策略集的一致性和完整性

    公开(公告)号:US08904472B2

    公开(公告)日:2014-12-02

    申请号:US12945642

    申请日:2010-11-12

    IPC分类号: G06F17/00 G06F21/60

    CPC分类号: G06F21/604

    摘要: Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies.

    摘要翻译: 访问控制策略集的一致性和/或完整性可以被验证和/或验证。 可以接收访问控制策略集。 访问控制策略集可以包括允许或不允许访问计算资源的访问控制策略。 访问控制策略中的各个可以包括一个或多个属性。 响应于缺少预定顺序的给定访问控制策略的一个或多个属性,给定访问控制策略的一个或多个属性可被排序成预定顺序。 可以基于访问控制策略来生成决策树。 可以分析决策树以确定(1)访问控制策略中的一个或多个是否不完整的一个或多个,或者(2)访问控制策略中的一个或多个与一个或多个其他访问控制策略是否不一致 访问控制策略。

    VALIDATION OF CONSISTENCY AND COMPLETENESS OF ACCESS CONTROL POLICY SETS
    3.
    发明申请
    VALIDATION OF CONSISTENCY AND COMPLETENESS OF ACCESS CONTROL POLICY SETS 有权
    一致性验证和访问控制策略集的完整性

    公开(公告)号:US20120124639A1

    公开(公告)日:2012-05-17

    申请号:US12945642

    申请日:2010-11-12

    IPC分类号: G06F17/00

    CPC分类号: G06F21/604

    摘要: Consistency and/or completeness of access control policy sets may be validated and/or verified. An access control policy set may be received. The access control policy set may include access control policies that allow or disallow access to computing resources. Individual ones of the access control policies may include one or more attributes. The one or more attributes of a given access control policy may be ordered into a predetermined order responsive to the one or more attributes of the given access control policy lacking the predetermined order. A decision tree may be generated based on the access control policies. The decision tree may be analyzed to determine one or more of (1) whether one or more of the access control policies are incomplete, or (2) whether one or more of the access control policies are inconsistent with one or more other ones of the access control policies.

    摘要翻译: 访问控制策略集的一致性和/或完整性可以被验证和/或验证。 可以接收访问控制策略集。 访问控制策略集可以包括允许或不允许访问计算资源的访问控制策略。 访问控制策略中的各个可以包括一个或多个属性。 响应于缺少预定顺序的给定访问控制策略的一个或多个属性,给定访问控制策略的一个或多个属性可被排序成预定顺序。 可以基于访问控制策略来生成决策树。 可以分析决策树以确定(1)访问控制策略中的一个或多个是否不完整的一个或多个,或者(2)访问控制策略中的一个或多个是否与一个或多个其他访问控制策略不一致 访问控制策略。