期刊文献+

可信网络研究 被引量:253

Research on Trustworthy Networks
下载PDF
导出
摘要 当前孤立、单一和附加的网络安全系统已经不能满足客观需求.该文在分析可信网络的产生背景和动机的基础上,提出了可信网络的概念,揭示了其基本属性,即安全性、可生存性和可控性,阐述了它们之间的紧密联系,并讨论了可信网络研究需要解决的关键科学问题.最后,介绍了国际上与此相关的研究工作. As networks have grown in size and complexity, the existing isolated and add-on secure systems of Internet are confronting some serious challenges, with frequent failures of withstanding malicious attack, mis-malicious damage and systems fault. Trustworthy networks will be an important trend of the research on network security. In this paper, three essential properties are proposed and explained to interpret trustworthy of network, namely security, survivability and controllability. Four key issues needed to be resolved are also discussed. Finally, some current works about trustworthy networks are introduced.
作者 林闯 彭雪海
出处 《计算机学报》 EI CSCD 北大核心 2005年第5期751-758,共8页 Chinese Journal of Computers
基金 国家自然科学基金(90412012 90104002) 国家"九七三"重点基础研究发展规划项目基金(2003CB314804) 国家自然科学基金委员会与香港研究资助局合作基金(60218003)资助.~~
关键词 可信网络 安全性 可生存性 可控性 Computer architecture Controllability Failure analysis Internet Mathematical models Security of data
  • 相关文献

参考文献17

  • 1.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 2邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004,27(1):1-11. 被引量:84
  • 3林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 4Ranganathan Kumar. Trustworthy pervasive computing: The hard security problems. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops, Orlando, FL, 2004, 117~121
  • 5Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 6Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65
  • 7Paulson L.D.. Stopping intruders outside the gates. IEEE Computer, 2002, 35(11): 20~22
  • 8International Standards Organization. Information Processing Systems-OSIRM. Part2: Security Architecture, ISO/TC 97 7498-2, 1998
  • 9Vaidya N.H.. A case for two-level recovery schemes. IEEE Transactions on Computers, 1998, 47(6): 656
  • 10Avizienis A.. Design of fault-tolerant computers. In: Proceedings of AFIPS Conference, 1967, 31: 733~743

二级参考文献57

  • 1Floyd S. High-Speed TCP for large congestion windows. RFC3649, 2003.
  • 2DataTAG. http://datatag.web.cern.ch/datatag/networking.html
  • 3Corson MS. Internet-Based mobile ad hoc networking. IEEE Internet Computing, 1999. 63-70.
  • 4Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38:393-422.
  • 5Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proc. of the 5th ACM/IEEE Int'l Conf. on Mobile Computing and Networking. 1999. 263-270.
  • 6Saltzer H, Reed DP, Clark D. End to end argument in system design. ACM Trans. on Computing System, 1984,2(4):277-288.
  • 7Tennenhouse DL, Wetherall D. Towards an active network architecture. Computer Communication Review, 1996,26(2):21-28.
  • 8Yemini Y, Silva S. Towards programmable networks. In: Proc. of the IFIP/IEEE Int'l Workshop on Distributed Systems:Operations and Management. 1996.
  • 9Bhattacharjee S, Calvert KL, Zegura EW. Commentaries on ‘Active Networking and End to End Argument'. IEEE Network, 1998,12(3):66-71.
  • 10Zhang J. Burst traffic meets fading: A cross-layer design perspective. In: Proc. of the 40th Allerton Conf. on Communications,Control, and Computing. 2002.

共引文献162

同被引文献2256

引证文献253

二级引证文献2114

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部