Research on Secure Key Techniques of Trustworthy Distributed System

被引:0
|
作者
He, Ming [1 ,2 ]
Hu, Aiqun [3 ]
Qiu, Hangping [1 ]
机构
[1] PLA Sci & Technol Univ, Inst Command Automat, Nanjing, Peoples R China
[2] Southeast Univ, Inforamat Sci & Engn Inst, Nanjing, Peoples R China
[3] Southeast Univ, Inforamat Sci & Engn Sch, Nanjing, Peoples R China
关键词
trustworthy distributed system; trustworthiness; controllability; survivability;
D O I
10.1109/ICCET.2009.100
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through budding the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.
引用
收藏
页码:172 / +
页数:3
相关论文
共 50 条
  • [1] Research on Behavior Trust based on Trustworthy Distributed System
    He, Ming
    Hu, Aiqun
    Qiu, Hangping
    [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 396 - +
  • [2] Use of Distributed Trustworthy Node to secure AS_PATH
    Kong, Lingjing
    Zeng, Huaxin
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 35 - 38
  • [3] Research on key techniques of distributed product data management
    Wu, D
    Wang, XK
    Wei, ZQ
    Li, YS
    Li, HF
    [J]. PROGRESS OF MACHINING TECHNOLOGY: WITH SOME TOPICS IN ADVANCED MANUFACTURING TECHNOLOGY, 2000, : 847 - 852
  • [4] Key techniques research on distributed product cooperative design
    Zhang, RG
    Zhang, JF
    [J]. CONCURRENT ENGINEERING: THE WORLDWIDE ENGINEERING GRID, PROCEEDINGS, 2004, : 133 - 136
  • [5] RESEARCH ON KEY TECHNIQUES OF ETG SYSTEM
    Du, Yanbing
    [J]. INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS II, PTS 1-3, 2011, 58-60 : 2134 - 2140
  • [6] Research on the key problem in distributed multimedia system
    [J]. 2001, Shenyang Institute of Computing Technology (22):
  • [7] Community research activities in secure and trustworthy ICT infrastructures
    Bart Van Caenegem
    Thomas Skordas
    [J]. Telecommunication Systems, 2007, 35 : 89 - 97
  • [8] Community research activities in secure and trustworthy ICT infrastructures
    Van Caenegem, Bart
    Skordas, Thomas
    [J]. TELECOMMUNICATION SYSTEMS, 2007, 35 (3-4) : 89 - 97
  • [9] Research on Key Techniques for Ontology Construction System
    Deng, Xiaoya
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION TECHNOLOGY, MANAGEMENT AND HUMANITIES SCIENCE (ETMHS 2015), 2015, 27 : 314 - 317
  • [10] Research on Key Techniques of Collaborative Design System
    李祥
    [J]. High Technology Letters, 2001, (02) : 51 - 53