2014
DOI: 10.4304/jmm.9.4.548-552
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Certificates Chain Searching Algorithms Based on Trustworthy

Abstract: To address the distributed certificates searching problem in trust management, the member set and privilege set are defined, the forward, backward and bidirectional distributed certificates searching algorithms based on the definitions are brought forward, the complexity of the algorithms and also the comparison of the algorithms and existing algorithms are analyzed, the application of the algorithms is described with an instance. It is proved that the algorithm has high practicability and efficiency with the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…The table structure of unified basic information table is shown in table I. There is a set of access control policies achieved in application systems, each access control policy may be different from others. The unified identity authentication system we presented uses a method of double authentication to solve the problems of unified identity authentication [18].…”
Section: Solution For Developed Application Systemsmentioning
confidence: 99%
“…The table structure of unified basic information table is shown in table I. There is a set of access control policies achieved in application systems, each access control policy may be different from others. The unified identity authentication system we presented uses a method of double authentication to solve the problems of unified identity authentication [18].…”
Section: Solution For Developed Application Systemsmentioning
confidence: 99%