International Journal of Wireless and Microwave Technologies(IJWMT)
ISSN: 2076-1449(Print),ISSN: 2076-9539(Online)
DOI: 10.5815/ijwmt
Research on Trustworthy Distributed System | |
Full Text (PDF, 232KB), PP.41-47 | |
Author(s) | |
LUO Chen,HE Ming,LIU Xiao-Ming,LI Yuan | |
Index Terms | |
trustworthiness; trustworthy distributed system; controllability; survivability | |
Abstract | |
To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed. | |
Reference | |
[1]Cyber Trust [EB/OL]. http://www.nap.edu/catalog/6161.html,2006. [2]LIN Chuang, REN Fengyuan. New network with trustworthiness and controllability as well as expansibility[J]. Software Journal, 2004, 15(12): 1815-1821. (in Chinese) [3]LIN Chuang, PENG Xuehai. Research on network architecture with trustworthiness and controllability[J]. Journal of Computer Science and Technology, 2006, 21(5): 732-739. [4]LIN Chuang, PENG Xuehai. Research on trustworthiness of network[J]. Computer Journal, 2005, 28(5): 751-758. (in Chinese) [5]LIN Chuang, WANG Yang, LI Linquan. Random model method and evaluation technology of network security[J]. Computer Journal, 2005, 28(12): 1943-1956. (in Chinese) [6]TIAN Junfeng, XIAO Bing, MA Xiaoxue, et.al. Trustworthy model and analysis in TDDSS[J]. Computer research and development. 2007, 44(4): 598-605. (in Chinese) [7]SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et.al, Summarazation of information security[J]. China Science: E(Information Science), 2007, 37(2): 129-150. | |
Citation | |
LUO Chen,HE Ming,LIU Xiao-Ming,LI Yuan,"Research on Trustworthy Distributed System", IJWMT, vol.2, no.3, pp.41-47, 2012. |
Copyright © 2007-2014 MECS. All Rights Reserved.
Microsoft Internet Explorer is recommended if the page is not displayed properly!