Movatterモバイル変換


[0]ホーム

URL:


IEICE Transactions on Information and Systems
Online ISSN : 1745-1361
Print ISSN : 0916-8532
Special Section on Foundations of Computer Science
Formal Language Theoretic Approach to the Disclosure Tree Strategy in Trust Negotiation
Yoshiaki TAKATAHiroyuki SEKI
Author information
  • Yoshiaki TAKATA

    Kochi University of Technology

  • Hiroyuki SEKI

    Nara Institute of Science and Technology

Corresponding author

ORCID
Keywords:trust management,trust negotiation,negotiation strategy,computational complexity,context-free grammar
JOURNALFREE ACCESS

2009 Volume E92.DIssue 2Pages 200-210

DOIhttps://doi.org/10.1587/transinf.E92.D.200
Details
  • Published: February 01, 2009Received: March 26, 2008Available on J-STAGE: February 01, 2009Accepted: -Advance online publication: -Revised: -
Download PDF(543K)
Download citationRIS

(compatible with EndNote, Reference Manager, ProCite, RefWorks)

BIB TEX

(compatible with BibDesk, LaTeX)

Text
How to download citation
Contact us
Article overview
Share
Abstract
Trust negotiation is an authorizing technique based on digital credentials, in which both a user and a server gradually establish trust in each other by repeatedly exchanging their credentials. A trust negotiation strategy is a function that answers a set of credentials to disclose to the other party, depending on policies and the set of already disclosed credentials. The disclosure tree strategy (DTS), proposed by Yu et al., is one of the strategies that satisfies preferable properties. DTS in a simple implementation requires exponential time and space; however, neither an efficient algorithm nor the lower-bound of its complexity was known. In this paper, we investigate the computational complexity of DTS. We formulate subproblems of DTS as problems on derivation trees of a context-free grammar (CFG), and analyze the computational complexity of the subproblems using the concepts of CFGs. As a result, we show that two subproblemsEVL andMSET of DTS areNP-complete andNP-hard, respectively, while both are solvable in polynomial time if we modifyEVLnot to require non-redundancy andMSET not to answer any subset useless for leading the negotiation to success.
References (15)
Related articles (0)
Figures (0)
Content from these authors
Supplementary material (0)
Result List ()
Cited by (0)
© 2009 The Institute of Electronics, Information and Communication Engineers
Previous articleNext article
Favorites & Alerts
Related articles

Recently viewed articles
    Announcements from publisher
    Share this page
    feedback
    Top

    Register with J-STAGE for free!

    Register

    Already have an account? Sign inhere


    [8]ページ先頭

    ©2009-2025 Movatter.jp