It is the cache of ${baseHref}. It is a snapshot of the page. The current page could have changed in the meantime.
Tip: To quickly find your search term on this page, press Ctrl+F or ⌘-F (Mac) and use the find bar.

International Journal of Wireless and Microwave Technologies(IJWMT))

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449(Print),ISSN: 2076-9539(Online)
DOI: 10.5815/ijwmt

Published By: MECS Publisher
  • IJWMT Vol.2, No.3, June 2012

Research on Trustworthy Distributed System

 
Full Text (PDF, 232KB), PP.41-47  
Author(s)  
LUO Chen,HE Ming,LIU Xiao-Ming,LI Yuan  
Index Terms  
trustworthiness; trustworthy distributed system; controllability; survivability  
Abstract  
To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.
 
Reference  
[1]Cyber Trust [EB/OL]. http://www.nap.edu/catalog/6161.html,2006.
[2]LIN Chuang, REN Fengyuan. New network with trustworthiness and controllability as well as expansibility[J]. Software Journal, 2004, 15(12): 1815-1821. (in Chinese)
[3]LIN Chuang, PENG Xuehai. Research on network architecture with trustworthiness and controllability[J]. Journal of Computer Science and Technology, 2006, 21(5): 732-739.
[4]LIN Chuang, PENG Xuehai. Research on trustworthiness of network[J]. Computer Journal, 2005, 28(5): 751-758. (in Chinese)
[5]LIN Chuang, WANG Yang, LI Linquan. Random model method and evaluation technology of network security[J]. Computer Journal, 2005, 28(12): 1943-1956. (in Chinese)
[6]TIAN Junfeng, XIAO Bing, MA Xiaoxue, et.al. Trustworthy model and analysis in TDDSS[J]. Computer research and development. 2007, 44(4): 598-605. (in Chinese)
[7]SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et.al, Summarazation of information security[J]. China Science: E(Information Science), 2007, 37(2): 129-150.
 
Citation  

LUO Chen,HE Ming,LIU Xiao-Ming,LI Yuan,"Research on Trustworthy Distributed System", IJWMT, vol.2, no.3, pp.41-47, 2012.