期刊文献+

时间戳服务器并行数据处理的设计与实现

Design and Implementation of Parallel Data Processing of A Time Stamp Server
下载PDF
导出
摘要 使用已设计实现的高性能密码服务器系统[2]作为TSS系统底层密码功能的硬件实现,给出了TSS系统的分析与设计。通过使用多线程技术,使TSS可以充分调度密码服务器中密码模块上的多个密码芯片的运算功能,从而支持并行产生时间戳签名操作。为了降低因频繁产生和频繁释放服务器工作线程所引起的系统开销,设计了工作任务线程池用于产生和管理TSS的服务工作线程,并给出了线程池维护管理算法的设计与实现。 This paper presents the results of the analysis and design of a TSS server system architecture. By using multi-threading, TSS can schedule system resources to support parallel time stamping among crypto chips in crypto modules of the co-server. In order to decrease the cost of creating and releasing threads frequently, the thread pool is used to create and manage TSS' task server threads. Finally, the algorithm of managing TSS task thread pool is presented and implemented.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第16期89-91,共3页 Computer Engineering
基金 国家"十五"重点科技攻关项目(2002BA103A04) 国家兵器预研支撑基金资助项目
关键词 时间戳 时间戳服务器 多线程 线程池 并行处理 Time stamp Time stamp server Multithread Thread pool Parallel processing
  • 相关文献

参考文献9

  • 1ISO/IEC WD 18014-1. Information Technology, Security Techniques,Time Stamping Services Part 1: Framework[S]. 2000.
  • 2容晓峰,苏锐丹,刘平,周利华.密码服务系统安全性能分析与测试[J].系统工程与电子技术,2004,26(10):1510-1513. 被引量:2
  • 3Haber S, Stometta W S. How to Time-stamp a Digital Document[J].Journal of Cryptology, 1991, 3(2): 99-111.
  • 4Buldas A, Laud P. New Linking Schemes for Digital Timestamping[C]. Proceedings of the 1^st International Conferences on Information Security and Cryptology, Seoul Korea, 1998: 3-14.
  • 5Adams C, Cain P, Pinkas D, et al. Intemet X.509: Public Key Infrastructure Time Stamp Protocol [S]. IETF, RFC 3161, 2001.
  • 6陈开渠,冯登国.十进制时间戳协议[C].第二届中国信息与通信安全学术会议论文集.上海:上海科学技术出版社,2001:82—87.
  • 7韩玮,冯飞,陈晓峰,王育民.基于PKI体系的数字时间认证方案[J].计算机学报,2003,26(10):1355-1360. 被引量:3
  • 8刘军,吴贵臣,翁亮.安全电子时间戳系统的设计方案[J].通信学报,2003,24(2):64-70. 被引量:6
  • 9Mantel H, Sabelfeld A. A Generic Approach to the Security of Multi-threaded Programs[C]. Proceedings of the 14^th IEEE Computer Security Foundations Workshop, Canada, 2001: 133-141.

二级参考文献18

  • 1刘军 吴贵臣.低频频段无线电频谱资源的应用与进展[A]..中国电子学会第七届学术年会论文集[C].北京: 人民邮电出版社,2001.595-600.
  • 2Haber S, Stornetta W S. How to time-stamp a digital document. Journal of Cryptology, 1991, 3 (2):99~111.
  • 3Bayer D, Haber S, Stornetta W S. Improving the efficiency and reliability of digital time-stamping. In: Capocelli R, Desantis A,Vaccaro U eds. Proceedings of Sequences'91: Methods in Communication, Security, and Computer Science, Berlin, New York, Tokyo: Springer-Verlag, 1992. 329~334.
  • 4Benaloh J, de Mare M. Efficient broadcast time-stamping.Clarkson University Department of Mathematics and Computer Science, Technical Report 1, 1992.
  • 5Buldas A, Laud P. New linking schemes for digital time-stamping. In: Proceedings of the 1st International Conference on Information Security and Cryptology, Seoul Korea, 1998. 3~14.
  • 6Buldas A, Laud P, Lipmaa H, Villemson J. Time-stamping with binary linking schemes. In.. Proceedings of Advances in Cryptology CRYPTO'98, Santa Barbara, USA, 1998,1462:486~501.
  • 7Wang Yu-Min, He Da-Ke. Cryptography Theory & Application.Xi'an: Xidian University Press, 1990 (in Chinese).
  • 8Housley, Ford R, Polk W, Solo D. Internet X. 509 public key infrastructure, certificate and CRL profile. IETF RFC 2459,1999.
  • 9Adams C, Cain P, Pinkas D, Zuccherato R. Internet X. 509:Public key infrastructure time stamp protocol (TSP). IETF RFC 3161. 2001.
  • 10Pinkas D, Ross J, Pope N. Electronic signature formats for long term electronic signatures. IETF RFC 3126, 2001.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部