期刊文献+

一种基于门限RSA的容侵系统结构 被引量:1

An Intrusion Tolerant Architecture Based on Threshold RSA
下载PDF
导出
摘要 指出了为保护大的服务器群组 ,继防火墙和入侵检测技术之后容侵技术已成为又一重要技术 .提出了一种容忍入侵的体系结构 ,对系统组件采用冗余和多样性技术相结合 ,利用门限秘密共享技术实现系统的可用性和关键数据的保密性 ,来达到容忍入侵的目的 . For protecting the large server group, the technology of Intrusion Tolerant System has become another essential technique succeeding the firewall and IDS techniques. This paper proposes a framework model of ITS(Intrusion Tolerant System) .We utilize the techniques of both redundancy and diversity and threshold secret share schemes to implement the survivability of system and to protect confidential data from compromised service in the presence of intrusions.
作者 张宇
出处 《中南民族大学学报(自然科学版)》 CAS 2004年第4期68-71,共4页 Journal of South-Central University for Nationalities:Natural Science Edition
基金 国家民委科学基金资助项目 (MZY0 0 0 0 4 )
关键词 容侵 入侵检测系统 网络安全 intrusion tolerant intrusion detection system network security
  • 相关文献

参考文献3

二级参考文献17

  • 1[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 2[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 3[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 4[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.
  • 5[1]Cukier M,Courtney T,Lyons J,et al. Providing Intrusion Tolerance With ITUA[EB/OL]. http://itua.bbn.com/,2002-04-05.
  • 6[2]Cukier M,Courtney T,Lyons J,et al. Intrusion Tolerance Approaches in ITUA[EB/OL].http://itua.bbn.com/,2002-4-5.
  • 7[3]Pal P,Webber F,Schantz RE,et al. Intrusion Tolerant Systems [EB/OL]. http://itua.bbn.com/,2002-04-05.
  • 8[4]Wang R,Wang F,Byrd GT. Design and Implementation of Acceptance Monitor for Building Scalable Intrusion Tolerant Systems [EB/OL]. http://sitar.anr.mcnc.org/,2002-09-24.
  • 9[5]Wang F,Gong F,Sargor C,et al. SITAR:A Scalable Intrusion Tolerance Architecture for Distributed Server [EB/OL]. http://sitar.anr.mcnc.org/,2002-09-24.
  • 10[6]Dutertre B,Crettaz V,Stavridou V. Intrusion-Tolerant Enclaves[EB/OL]. http://www.derkeiler.com/Mailing-Lists/securityfocus/focus-ids/2002-05/0057.html,2002-10-13.

共引文献77

同被引文献6

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部