期刊文献+

基于异构平台的入侵容忍COTS服务器设计与实现 被引量:1

Design and Implementation of an Intrusion-tolerant COTS-based Server on Heterogeneous Platforms
下载PDF
导出
摘要 提出了利用异构平台搭建的可以透明支持COTS产品的入侵容忍服务器方案――ITHP,并通过分析和试验系统测试两种方式,证明了ITHP方案可以屏蔽大多数的未知漏洞。 This paper proposes a model of intrusion tolerance system, which is constructed with heterogeneous platform and could support COTS products transparendy. And then through mathematic analysis and test results of an experimental system, it is proved that the model could mask system's most unknown leakages.
作者 王慧强 戎檄
出处 《计算机工程》 CAS CSCD 北大核心 2006年第3期177-179,182,共4页 Computer Engineering
基金 国防预研重点资助项目 武器装备预研基金资助项目
关键词 入侵容忍 COTS 异构平台 ITHP Intrusion tolerance COTS Heterogeneous platform ITHP
  • 相关文献

参考文献6

  • 1荆继武,周天阳.Internet上的入侵容忍服务技术[J].中国科学院研究生院学报,2001,18(2):119-123. 被引量:25
  • 2韩炜,臧红伟.N版本编程技术的软件可靠性分析[J].微电子学与计算机,2003,20(5):62-63. 被引量:8
  • 3刘国灿,刘锦德.基于COTS的系统综述[J].计算机应用研究,2003,20(1):5-7. 被引量:7
  • 4Goseva-Popstojanova K,Wang F,Wang R,et al.Characterizing Intrusion Tolerant Systems Using a State Transition Model[C].Proc.of DARPA Information Survivability Conference and Exposition II (DISCEX-II),Anaheim,California,2001-06.
  • 5MCNC and Duke University.Sitar:A Scalable Intrusion Tolerant Architecture for Distributed Services[R].Technical Report,Research Proposal to DARPA BAA-00-15,2000.
  • 6Cristian F.Understanding Fault-tolerant Distributed Systems[J].Communications of the ACM,1991,34 (2):56-78.

二级参考文献15

  • 1程明华 姚一平 韩炜 林坚.非相似软、硬件容错系统动态故障树分析[A]..第八届全国容错计算学术会议论文集[C].哈尔滨,1999,10.185—189.
  • 2韩炜.非相似容错计算机系统设计及其验证技术研究:博士学位论文[D].西北工业大学,2002,5.
  • 3[1]COTS and Open Systems--An Overview[EB/OL]. http://www.sei.cmu.edu/cbs/papers/ monographs/cots-open-systems/cots.open.systems.htm,2001-11.
  • 4[2]CBS Overview[EB/OL].http://www.sei.cmu.edu/cbs/over-view.html,2002-01.
  • 5[3]B Boehm,C Abts.COTS Integration:Plug and Pray?[J].Computer,1999,(1):135-138.
  • 6[4]Assembling Large Systems from COTS Components: Opportuni-ties,Cautions,and Complexities[EB/OL].http://www.sei.cmu.edu/cbs/papers/monographs/assembling-systems/assem-bling.systems.htm,2001-11.
  • 7[5]P Oberndorf,L Brownsword,C Sledge.An Activity Framework for COTS-based Systems[R].SEI Technical Report CMU/SEI-2000-TR-101,SEI,CMU,Pittsburgh,2000.
  • 8S S Brilliant, J C Knight. On the Performance of Software Testing Using Multiple Version.
  • 9Mei-Chen Hsueh and Ravishankar K Iyer. Dependability and Performance Measurement Computer Aided Design Test Evalution for Dependability, Processing of IEEE on Avionics, NewYork,1992.
  • 10William R Dunn. Software Reliability: Measures and Effects in Flight Critical Digital Avionics Systems. IEEE Trans on Miroprocessors and Microsystems, 1988, (21), 120-123.

共引文献36

同被引文献18

  • 1殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 2郭世泽,牛冠杰,郑康锋.入侵容忍系统模型构建及量化分析[J].北京邮电大学学报,2007,30(1):36-39. 被引量:14
  • 3FRAGA J S, POWELL D. A fault and intrusion-tolerant file system [ C]//Proc of the 3rd International Conference on Computer Security. 1985:203-218.
  • 4DOBSON J E, RANDELL B. Building reliable secure systems out of unreliable insecure components [ C ]//Proc of IEEE Symposium On Security and Privacy. Oakland : IEEE Press, 1986 : 187-193.
  • 5WU T,MALKIN M,BONEH D. Building intrusion tolerant applications[ C]//Proc of the 8th Conference on USENIX Security Symposium. Berkeley :USENIX Association, 1999:79-91.
  • 6ZHOU Li-dong,FRED B S, RENESSE R van. COCA:a secure distributed on-line certification authority[ J ]. ACM Trans on Computer Systems, 2002,20 ( 4 ) :329-368.
  • 7MARSH M A,SCHNEIDER F B. CODEX:a robust and secure secret distribution system[ J]. IEEE Trans on Dependable and Secure Computing,2001,1 ( 1 ) :3447.
  • 8LEE G, IM C, LEE T, et al. SITIS: sealable intrusion tolerance middleware for Interuet service survivability [ C ]//Proc of the 5th Pacific Rim Conference on Multimedia. Berlin : Springer,2004:564--571.
  • 9JING Ji-wu, LIU Peng, FENG Deng-yuo, et al. ARECA: a highly attack resilient certification authority[ C]//Proc of ACM Workshop on Survivable and Self-regenerative Systems. New York: ACM Press, 2003:53-63.
  • 10RABIN T. A simplified approach to threshold and proactive RSA [C]//Proc of the 18th Annual International Cryptology Conference on Advances in Cryptology. London : Springer-Verlag, 1998 : 89-104.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部