永发信息网

高分急求 计算机技术的文献翻译

答案:1  悬赏:60  手机版
解决时间 2021-07-30 13:12

求翻译..自己翻译的很痛苦,翻译过来却不明白技术中的知识点,希望能得到帮助,急求! 实在不行,能告诉我这是哪本书中的知识点,或者相对应的汉语书籍是什么都可以,急求!

Researchers recognized early on that negotiation strategies that directly disclose credentials may leak information about credentials and policies that are never disclosed. By observing the behavior of a party, one may also be able to determine what strategy they are using, which can be used as leverage in extracting additional information. We describe some of these leaks in this section.

A credential may contain more information than needed to satisfy a policy .For example, Alice can prove that she is over 21 by presenting a digital driver’s license. However, the license also gives her home address, exact date of birth, weight, and other details that are not needed to prove that she is over 21. To address these shortcomings, researchers have proposed versions of digital credentials that allow one to hide information that is irrelevant to the negotiation at hand, such as Alice’s home address [29, 60]. More sophisticated (and more expensive) schemes provide even more privacy, by avoiding direct disclosure of credentials. For example, Alice can prove that she is over 21, without disclosing her exact age [16, 17, 30, 15, 39]. These schemes allow Alice to prove to Bob that she has the properties specified in his policy, without Bob learning exactly what properties she has. For example, in the pharmacy example, Bob might learn that Alice is authorized to place an order, without learning who her doctor is. Bob only learns that Alice has some combination of properties that satisfy his policy.

Often, possession or non-possession of a sensitive credential is itself sensitive information. For example, suppose that Alice is a CIA employee, and Bob is looking for people who might be such agents. Bob might query people for their CIA credentials. Even if Alice has a policy to protect the credential, her response for Bob’s credentials on receipt of such a request can indicate that she has the credential. In other words, a request for such a credential may cause the recipient to issue counter-requests for credentials needed to satisfy disclosure of the sensitive credential. This, in turn, may indicate that the recipient possesses the sensitive credential. Non-possession may also be sensitive, and termination of a negotiation upon request for a credential can indicate non-possession.

If the value of an attribute in a credential is sensitive, then it is possible for a principal to determine ownership and value of the attribute by the other negotiating principal based on her replies. For example, suppose that Alice has a sensitive date of birth field in her driver’s license. Now, if Bob’s policy has a constraint on age, and upon receipt of Bob’s policy, Alice responds by asking for any further credentials from Bob, then Bob can assume that Alice has the attribute that satisfies the constraint. By using a scheme similar to inary search, it is possible for Bob to determine Alice’s age, without Alice evealing it to him.

Under many proposed approaches to trust negotiation [14, 62, 68], an attacker can even use a need-to-know attack to systematically harvest information bout an arbitrary set of credentials that are not even relevant to he client’s original request [52]. To do this, the attacker rewrites her policies n such a way that they are logically equivalent to the original policies, but hen used during negotiation, they force the victim into a series of disclosures elated to the credentials being harvested. Once the harvest is over, the egotiation completes as it would have with the original policies.

The most complete solution to these problems is to adopt a negotiation approach hat does not involve direct disclosure of credentials [16, 17, 30, 15, 24,39]. While these approaches vary in the degree of privacy that they provide, all of them can avoid the leaks cataloged in this section. The price of this improved protection, of course, is significantly longer execution times; thus one may wish to reserve these expensive strategies for policies that are particularly sensitive, and use direct disclosure elsewhere [41]. In general, these TN approaches replace direct disclosure with sophisticated cryptography, usually coupled with special-purpose formats for credentials. These approaches are very interesting in their own right; due to space limitations, we refer the reader to the publications listed above for more information.

In some instances, less expensive forms of protection can be effective against leakage. One approach is that when Bob queries Alice about a sensitive attribute, she does not respond, whether she has that attribute or not[57]. Only after Bob satisfies the conditions to allow disclosure does Alice would disclose the credential or disclose the fact that she does not possess it.This approach is also effective if non-possession is sensitive. However, it relies on the willingness of individuals to behave in the same manner whether or not they possess the sensitive attribute—and for those who do not possess it, there may be little incentive to behave in this manner, as the negotiation will progress faster if they immediately confess that they do not have the attribute.

Another solution with moderate runtime costs involves the use of acknowledgement policies [63]. In this scheme, Alice has an acknowledgement policy (ack-policy) for each possible sensitive credential, regardless of whether she has that credential or not. She only discloses whether she has the credential after the ack-policy has been satisfied. This approach also relies on the willingness of people who do not possess a sensitive attribute to act as though they did, even though it will prolong negotiations. The other disadvantage of this approach is that users will have many more policies, and policy specification and maintenance is a huge practical challenge.

Another way to address the problem is to abstract away from requesting specific credentials, and instead request a particular attribute [59]. For example, one can request age instead of a driver’s license. With the help of an ontology of concepts and credential contents, a party can choose which credential to disclose to prove possession of the desired attribute, in such a manner that as little sensitive information as possible is disclosed in the process. For example, Alice might choose to prove her age by disclosing her passport rather than her driver’s license, as the latter includes her home address and other sensitive information not present in a passport. The ontology can also be used to help respond to requests for a particular attribute by disclosing either more specific or more general information than was requested. For example, if asked to prove North American residency, a party might instead prove that they live in Mexico.

In all approaches where parties directly disclose credentials to one another, a credential owner has no guarantee that the other party will not show her disclosed credentials and policies to additional parties. In other words, there is no guarantee, or even any suggestion, that others will respect her disclosure policies. PeerAccess [66] addresses this problem by requiring recipients of information to ensure that future recipients of that information also satisfy the original owner’s disclosure policies; however, a malicious party could simply ignore this requirement. Another low-cost option is to employ P3P during trust negotiation, as proposed for the privacy-preserving version of the Trust-χ framework for TN [60]. Under this approach, information owners can examine the P3P policies of their negotiation partners, before disclosing any credentials or policies. Of course, a malicious party might not abide by their own P3P policy. In addition, when a credential is forwarded to a third party, the original owner does not have the opportunity to inspect the P3P policy of that party and approve the transfer. If these are significant concerns, then a more expensive TN approach that does not directly disclose credentials or policies is always an option.

最佳答案

译文是:研究人员早就认识到,谈判的策略,直接透露凭据可能会泄漏有关凭据和政策方面的信息永远不会公布。通过观察当事人的行为,也可能够确定他们使用的策略,可以作为讨价还价的条件,在提取的其他信息。
我们描述了本节这些泄漏一些。
凭据可能包含更多的信息比需要满足的政策。例如,Alice可以证明她已超过21岁出示数字驾驶执照。然而,授权也给她的家庭住址,确切的出生日期,重量,而且不需要证明她是21岁以上的其他细节。为了解决这些缺陷,
研究人员提出了数字证书的版本,允许一个隐藏的信息是无关手头的谈判,如爱丽丝的家庭地址[29,60]。更复杂的(也是更昂贵)的计划提供更多的隐私,避免直接披露的凭据。例如,Alice可以证明她已超过21岁没有研发,
isclosing她的确切年龄,[16,17,30,15,39]。这些计划允许爱丽丝证明给鲍勃,她没有在他的施政鲍勃指定的属性,属性的学习正是她。例如,在药房例如,Bob可能得知爱丽丝有权进行订单,而不必学习她的医生是谁。鲍勃只得知爱丽丝有一定的物业组合,满足他的政策。
通常情况下,拥有或不拥有一个敏感的凭据本身的敏感信息。例如,假设Alice是中央情报局雇员,鲍勃的人谁可能会产生这样代理。鲍勃可能为他们中央情报局证书查询的人。即使爱丽丝有政策,以保护证书,
她的这一请求后鲍勃的凭据反应可以表明这是她的凭据。换句话说,为这样一个凭据请求可能导致收件人发出反的,要满足敏感凭证披露证书的请求。这反过来,可能表明该收件人具有敏感的凭据。非占有也可以
敏感,并终止了谈判时的凭证可以表明不拥有的要求。
如果证书中的一个属性的值是敏感的,确定的主要所有权和属性值,那么有可能被其他谈判主要根据她的答复。例如,假设有艾丽斯出生领域她的驾驶执照敏感日期。现在,如果Bob的政策对年龄的限制,并呼吁鲍勃的政策后,
艾丽丝从鲍勃的任何进一步的凭证要求作出回应,那么鲍勃可以假设艾丽斯属性满足约束。通过使用类似的计划inary搜索,有可能鲍勃确定爱丽丝的年龄,而艾丽丝evealing他。
在许多建议的方法信任协商[14,62,68],攻击者甚至可以使用需要知情攻击信息系统收获回合的凭据甚至不相关的,他的客户端的原始请求[52任意设置] 。要做到这一点,攻击者改写自己的政策n,使得他们的方式,逻辑上等同于原始的政策,
但母鸡的谈判过程中使用到的披露兴高采烈的全权证书系列,他们逼迫受害人正在收获。一旦收获结束,egotiation完成,因为它会与原来的政策。
最彻底的解决这些问题将通过谈判的方式帽子不涉及证书直接披露[16,17,30,15,24,39]。虽然这些方法在不同的隐私,他们提供的程度,他们都能够避免本节编目的泄漏。这一改进的保护价,当然,
显着的执行时间较长,因此不妨对保留的政策,特别敏感,这些昂贵的策略,直接披露和使用其他[41]。一般来说,这些总氮方法代替复杂的密码通常与特殊用途的凭证格式的结合,直接披露。这些方法很有趣,自己的权利,由于篇幅所限,我们向读者提到上市更多信息上述出版物。
在某些情况下,更便宜的保护方式,可以有效的防渗漏。一种方法是,当鲍勃查询属性的一个敏感的爱丽丝,她没有回应,她是否有该属性或不[57]。只有在鲍勃满足条件,使爱丽丝将披露不披露或披露的凭据的事实,她不拥有它。
这种方法也是有效的,如果不拥有敏感。然而,对个人愿意以同样的方式表现他们是否拥有敏感的属性,并为那些谁不拥有它依赖,可能会没有动力,在这种方式的行为,有关的谈判将取得进展快如果他们立即承认他们没有属性。
另一个温和的运行成本,解决涉及承认政策的使用[63]。在这个方案中,艾丽斯的确认政策(又来了政策),为每个可能的敏感凭证,无论她的凭据或没有。她只透露她是否有凭据后,又来了,政策是满意的。
这种方法还依赖于人谁不具备一个敏感的属性,作为尽管他们,即使它会延长谈判的意愿。这种方法的另一个缺点是,用户将有更多的政策和策略规范和维护是一项巨大的现实挑战。
另一种方法解决这个问题,是抽象的距离要求的具体条件和要求,而不是一个特定的属性[59]。例如,一个可以请求年龄,而不是一个驾驶执照。随着一个概念和凭证内容本体的帮助下,一方可以选择凭证披露证明拥有所需的属性,
在这样的方式尽可能少的敏感信息的披露程序。例如,Alice可能选择,公开证明她的护照,而不是她的驾驶执照她的年龄,因为后者包括她的家庭住址和其它敏感信息不存在的护照。在本体论也可用于以帮助应对各种要求的particul
通过披露更加具体,或更一般的河属性信息比要求。例如,如果要求证明北美居住,而不是一方可能会证明他们在墨西哥生活。
在所有方法中,双方直接披露证书彼此,凭据业主不能保证对方不会显示她透露证书和其他政党的政策。换句话说,谁也不能保证,甚至任何建议,其他人会尊重她的披露政策。
PeerAccess [66]的地址,要求信息的接受者,以确保未来的受助人的资料,并在符合原来的主人的披露政策这一问题,但是,恶意的一方可以简单地忽略这个要求。另一种低成本的选择是采用P3P的信任协商过程中,作为拟议的隐私保版
信托-χ用TN框架[60]。根据这种方法,信息拥有者可以检查自己的谈判伙伴的P3P的政策,在透露任何凭据或政策。当然,恶意的一方可能不遵守自己P3P策略。此外,当凭据被转发给第三方,原业主没有机会检查这个党P3P策略和批准转让。如果这些是重要的问题,那么更昂贵的总氮方法不直接透露证书或政策始终是一个选择。


我要举报
如以上问答信息为低俗、色情、不良、暴力、侵权、涉及违法等信息,可以点下面链接进行举报!
大家都在看
树上有十只小鸟、打一只还有几只
我妈妈低烧20天怎么办,急急急急急急
梦幻诛仙青云门应穿什么装备
石鼓区衡阳花仙子鲜花这个地址怎么能查询到,
感情真的会过期吗?
手机上可以玩QQ农场吗?!?怎么玩啊!?急知
黄金分割点怎么求?
为什么我进了别人设密码的相册,密码是对的。
蜂蜜里含有雌激素吗,蜂蜜含有雌性激素吗?
巨剑不是不发光吗?怎么我见的巨剑发光呢
宛城区南阳药都社区居委会怎么去啊,谁知道地
DNF里大叔哪职业没觉醒
问问积分可以兑换Q币吗?
DNF里黑光在哪里爆?应该多少去刷?
为什么腋下长小肉粒,腋下长了个小肉粒是什么
推荐资讯
江夏区武汉梦幻发型设计(武长街辅路)在哪里啊
李世民对魏征说的名句,“以史为镜,可以知兴
隧道施工断面测量注意那些方面的安全问题?
什么是撞衫?
经常梦见在同一个地方
从吴淞码头到沪太路长途客运站,乘几路公交?
我的QQ登录有密保卡,怎么取消这项功能
骨髓捐赠应该去什么单位?
MP3和MP5哪个好一些P5都有哪些功能?什么牌子
龙亭区开封荣泰资产管理地址在什么地方,想今
爱人别不相信你的句子,有什么诗句描写夜深思
梦见老公答应和从前女朋友结婚
正方形一边上任一点到这个正方形两条对角线的
阴历怎么看 ?