期刊文献+

重叠组情形下全序多播协议的研究与实现 被引量:1

Research and implementation of total-ordered multicast protocol considering overlapped groups
下载PDF
导出
摘要 讨论了计算机网络安全领域中容忍入侵、复制技术、群组通信和全序广播之间的内在关联,分析了全序与全序多播的基本概念及属性,研究了重叠组情形下的全序多播及其在容忍入侵的群组通信系统中的实现问题,利用独立的组之间的全序多播协议Totem_Total,提出了一种能在重叠组之间保证全序的多播协议实现方案,给出了详细的伪代码描述并进行了分析. Internal relationships among intrusion tolerance, replication technology, group communication and total-ordered multicast are discussed. Definitions and properties of total order and total-ordered multicast are analyzed, total-ordered multicast for overlapped groups is discussed and its implementation in intrusion tolerant group communication system is researched. Totem-total which is one of total-ordered multicast protocols without considering overlapped group is selected and a new multicast protocol which can guarantee total order in overlapped groups is presented and is analyzed.
出处 《陕西师范大学学报(自然科学版)》 CAS CSCD 北大核心 2006年第1期21-23,共3页 Journal of Shaanxi Normal University:Natural Science Edition
基金 国家自然科学基金重大研究计划项目(90204012)
关键词 计算机网络安全 群组通信 全序多播 重叠组 协议 computer network security group communication total-ordered multicast overlapped group protocol
  • 相关文献

参考文献7

  • 1郭渊博,马建峰.面向服务的容忍入侵方法与设计[J].郑州大学学报(理学版),2004,36(2):62-66. 被引量:8
  • 2Budhiraja N.The primary-backup approach[M]∥Mullender S.Distributed Systems.New York:ACM Press,1993.199-216.
  • 3潘建平,顾冠群.群组通信模型及运输协议映射[J].软件学报,1998,9(8):574-579. 被引量:7
  • 4裴云彰,刘艳,TAN Kun,谭焜,史元春,徐光祐.全局有序的可靠多播协议[J].清华大学学报(自然科学版),2001,41(1):53-56. 被引量:5
  • 5Floyd S,Jacobson V,Liu C,et al.A reliable multicast framework for light-weight sessions and application level framing[J].IEEE ACM Trans Networking,1997,5 (6):784-803.
  • 6Kasera K S.Scalable fair reliable multicast using active services[J].IEEE Network Magazine (Special Issue on Multicast),2000,1(2):48-57.
  • 7Amir Y,Moser L E,Melliar-Smith P M,et al.The totem single-ring ordering and membership protocol[J].ACM Transsactions on Computer Systems,1995,13(4):311-342.

二级参考文献15

  • 1Pradhan D K. Fault tolerant computing: theory and techniques(Vol 1). New Jersey: Prentice-Hall, 1986.
  • 2Feldman P. A practical scheme for non-interactive verifiable secret sharing. In:Proc 28th Annual Symp, 1987. 427-437.
  • 3Schneider F. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 1990,22(4):299-319.
  • 4Shamir A. How to share a secret. Communication of the ACM, 1979,22(11):612-613.
  • 5Feldman P. A practical scheme for non-interactive verifiable secret sharing. In:Proc 28th Annual Symp. 1987. 427-437.
  • 6Guo Yuanbo, Ma Jianfeng. An efficient and robust conference key distribution protocol. In:The 2003 International Conference on Computer Networks and Mobile Computing. IEEE Press ,Shanghai,China, 2003. 20-23.
  • 7郭渊博 马建峰.一种实用的先应式安全体系架构研究[A]..见:第三届中国信息和通信安全学术会议[C].,2002.3.
  • 8顾冠群,CIMS-China’96会议论文集,1996年,708页
  • 9顾冠群,Proceedings of the 1st International Conference on CSCW in Design,1996年,242页
  • 10顾冠群,快捷运输协议规范4.0,1996年

共引文献16

同被引文献6

  • 1DESWARTE Y, BLAIN L, FABRE J. Intrusion tolerance in distributed computing systems[ A]. Proceedings IEEE Symposium on Security and Privacy[ C], Oakland, 1991. 110 -121.
  • 2DEFAGO X. Agreement-related Problems: From Semi-passive Replication to Orderded Broadcast[ A]. EPFL[ C]. Lausanne, 2000.
  • 3FELBER P, DEFAGO X, EUGSTER P, et al. Replicating CORBA objects: a marriage between active and passive replication [ A].Proc. of the 2nd IFIP Int'l Working Conf. on Distributed Applications and lnteroperable Systems (DAIS-2) [ C]. Finland: Helsinki,1999.
  • 4史美林,向勇.群组通信研究[J].通信学报,1998,19(1):45-53. 被引量:14
  • 5潘建平,顾冠群.群组通信模型及运输协议映射[J].软件学报,1998,9(8):574-579. 被引量:7
  • 6郭渊博,马建峰.面向服务的容忍入侵方法与设计[J].郑州大学学报(理学版),2004,36(2):62-66. 被引量:8

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部