期刊文献+

TDDSS中可信模型及其分析 被引量:4

The Trust Model and Its Analysis in TDDSS
下载PDF
导出
摘要 可信分布式数据库服务器系统TDDSS(trusted distributed database server system)顺应了目前可信计算的研究从单机到网络的研究趋势,在分布式数据库服务器系统DDSS(distributed database serversystem)中引入可信机制.分布式系统是一个正处于发展中的系统,许多机制有待进一步研究和完善.在分布式系统中引入可信性存在许多困难,为此对分布式系统开展可信性研究具有重大意义.利用可信技术,引入可信第三方,建立了完整的TDDSS模型和多层次系统信任链模型.在系统管理方面使用了角色管理机制.与此同时,改进了相应的系统认证和日志管理体系.为今后可信在计算机系统中的应用提供了完整的可靠模型,并对建立的TDDSS模型进行了整体的数学评估和科学检测. A new model-trusted distributed database server system (TDDSS) is presented in this paper. This new model breaks the situation in which trusted computing is always applied in PC. It introduces trusted mechanism from PC into distributed database server system (DDSS). And this model helps to find out a new application area for the trusted computing. Also set up are a complete model of TDDSS and the layers of trusted-chain in trusted distributed database server system with trusted computing technology. Trusted-chain presents assurance for the transfer of the trust. It transfers from the trusted root to the interior of the system. Role-based mechanism, which is recognized by more and more people, is posed in management in TDDSS. It defines a role for every client server, and role-based mechanism proposes a more flexible and scalable permission management model. At the same time, the mechanisms of authentication and log are improved in this system. Especially, two-level of logs is used in TDDSS. It improves the security and makes the information seeking much easier. In conclusion, a complete model for the application of trusted computing in computing systems is given. Furthermore the whole system model is evaluated with mathematics method, and its feasibility and efficiency are proved accurately.
出处 《计算机研究与发展》 EI CSCD 北大核心 2007年第4期598-605,共8页 Journal of Computer Research and Development
基金 河北省自然科学基金项目(F2004000133)
关键词 分布式数据库 可信评估 角色管理 distributed database trusted evaluation role-based management
  • 相关文献

参考文献11

二级参考文献28

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943. 被引量:16
  • 3Steve.J.Ayer著 王广益等译.客户/服务器应用开发指南--使用PAL和C++[M].,..
  • 4金士尧 胡华平 等.具有容错结构的高可用计算机双系统的研究.计算机研究与发展,1998,(8).
  • 5B Kalde,A Medlar.An Information System for Corporate Users:Wide Area Information Servers[R].Connexions-The Interoperability Report, 1991 ;5(11) :2~9.
  • 6Salvatore T March.Allcating Data and Operations to Nodes in Distributed Database Design[J].IEEE Transaction on Knowledge and Data Engineering, 1995 ; 7 ( 2 ).
  • 7W chang,G sheikholeslami,A Zhang.Elficient Resource Selection in Distributed Visual Information Systems[C].In:ACM Multimedia 97- Electronic Proceedings, 1997:8-14.
  • 8.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 9Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33
  • 10Nicol D.M., Sanders W.H., Trivedi K.S.. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48~65

共引文献519

同被引文献31

引证文献4

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部