期刊文献+

可生存性及紧急算法特征分析 被引量:2

Analysis on Characters of Survivability and Emergent Algorithms
下载PDF
导出
摘要 文章主要就无边界网络系统的可生存性问题及其解决方案-紧急算法两个方面进行分析。首先给出了作为网络信息系统发展方向的无边界系统的定义,分析其特征并引出无边界系统环境下的网络安全研究。然后提出满足安全新需求的无边界网络可生存性问题,分析了可生存性必须具备的特征及其与传统安全概念的区别,并简要分析了可生存系统的设计需求。最后着重分析了可以解决无边界网络可生存性问题的紧急算法的特征,给出了紧急算法的两种不同的定义描述,并对比分析了与传统分布式算法的不同,论文还就紧急算法的应用场合和开发策略进行了简单分析。 This paper mainly analyies survivability in unbounded networks and systems and its solution-emergent algorithms.Firstly,this paper defines unbounded systems as networks and information systems will develop into,analyzes characters of unbounded systems,and introduces the research of network security in unbounded systems.Secondly,it poses survivability in unbounded systems which meets new security requirements,analyzes the obligatory characters of survivability,points out the differences between survivability and traditional security concepts,and simply refers to requirements of survivable systems.Finally,it emphasizes the characters of emergent algorithms which can resolve survivability in unbounded networks,depict two different definition descriptions of emergent algorithms,differentiate them from traditional distributed algorithms,and briefly analyzes the application environments and development strategies of emergent algorithms.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第1期127-131,共5页 Computer Engineering and Applications
基金 北京市科技计划项目(编号:H020120090530)
关键词 可生存性 无边界网络 紧急算法 紧急属性 网络安全 survivability,unbounded network,emergent algorithm,emergent attribution,network security
  • 相关文献

参考文献10

  • 1Stefan Katzenbeisser,Fabien A P Petitcolas.lnformation hiding techniques for steganography and digital watermarking[M].ARTECH HOUSE, INC, 2000.
  • 2Mitchell D Swanson,Mei Kobayashi,Ahmed H Tewfik.Multimedia dalaembedding and watermarking technologies[J].Proceedings of the IEEE, 1998 ;86(6) : 1064-1087.
  • 3Fabien A P Petitcolas,Ross J Anderson,Markus G Kuhn.Information hiding--a survey[J].Proceedings of the IEEE, 1999 ;87(7) : 1062-1078.
  • 4Phen-Lan Lin.Robust transparent image watermarking system with spatial mechanisms[J].The Journal of Systems and Software,2000;50: 107-116.
  • 5Chi-Kwong Chan,L M Cheng.Security of Lin's image watermarking system[J].The Journal of Systems and Software,2002; 62 : 211-215.
  • 6D Kundur Hatzinakos.Digital watermarking using multiresolution wave- let decomposition[C].In:Proceedings of the International Conference on Acoustic,Speech and Signal Processing,Seattle,WA,1998:2969-2972.
  • 7Liang-Hua Chen,Jyh-Jiun Lin.Mean quantization based image watermarking[J].hnage and Vision Computing,2003;21:717-727.
  • 8G Voyatzis,I Pitas.Chaotic watermarks for embedding in the spatial digital image domain[C].In:Proc of ICIP'98,1998 ;2:432--436.
  • 9Zhao Dawei,Chen Guanrong,Liu Wenbo.A chaos-based robust waveletdomain watermarking algorithm[J].Chaos ,Solitons and Fractals, 2004 ; 22:47-54.
  • 10Ching-Yung Lin,Min Wu,Jeffrey A Bloom et al.Rotation,scale,and translation resilient watermarking for images[J].IEEE Transactions on Image Processing,2001 ; 10(5) :767-782.

同被引文献18

  • 1张鸿志,张玉清,李学干.网络可生存性研究进展[J].计算机工程,2005,31(20):3-5. 被引量:13
  • 2Verissimo P, Neves N F, Correia M. Intrusion-tolerant architectures : concepts and design Architecting dependable systems[J]. Lecture Notes in Computer Science, Springer Verlag, 2003,2677 : 3-36.
  • 3Mead N R, Ellison R J, Linger R C, et al. Survivable Network Analysis Method [C] // Intrusion Tolerant Systems Joint PI Meeting Presentation. Washington.. IEEE Computer Society Press, 2004.
  • 4De castro L. N, yon Zubcn P J. An artificial immune network for data analysis[A]. Abbas H A, Sarker R A, Newton C S, et al. Data Ming.. A Heuristic Apprach[M]. Idea Growp Publishing,2001,231.
  • 5Dengguo Feng, Ji Xiang. Experiences on Intrusion Tolerance Distributed System[C]//Proceedings of the Zgth Annual International Computer Software and Application Conference (COMPSAC'05) 2005 IEEE.
  • 6Yingqian Zhang, Efrat Manisterski, Sarit Kraus, et al. Computing the fault tolerance of multi-agent deployment[J]. Artificial Intelligence, 2009 (173) : 437-465.
  • 7Agustin Orfila, Javier Carbo, Arturo Ribagorda. Autonomous decision on intrusion detection with trained BDI agents[J]. Computer Communications, 2008 (31) : 1803- 1813.
  • 8Verissimo P, Neves N F,Correia M. Intrusion-tolerant architectures:concepts and design. Arehitecting dependable systems[J]. Lecture Notes in Computer Science, Springer Verlag, 2003,2677 : 3 - 36.
  • 9Mead N R, Ellison R J, Linger R C, et al. Survivable Network Analysis Method[C]//In:Intrusion Tolerant Systems Joint PI Meeting Presentation. Washington: IEEE Computer Society Press,2004.
  • 10Dengguo Feng, Ji Xiang. Experiences on Intrusion Tolerance Distributed System Proceedings of the 29th Annual International Computer Software and Application Conference (COMPSAC'05) [C]. 2005 IEEE.

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部