期刊文献+

入侵容忍技术在Web服务器系统的应用 被引量:2

APPLICATION OF INTRUSION-TOLERANT TECHNIQUES TO WEB SERVERS
下载PDF
导出
摘要 提出了一个具有入侵容忍特性的Web服务器系统。在系统设计中结合入侵容忍通用模型SITAR,应用了多代理、多样性、冗余等入侵容忍技术,在响应的一致性协商过程中引入分散选举算法和加密技术,提高了运行效率,加强系统的安全性。 An intrusion-tolerant Web service system is proposed. The scalable intrusion lolerance architecture for distributed service ( SITAR) is introduced, and the techniques of multi-proxy, diversity, and redundancy are applied in system design. Decentralized voting technique is introduced in content agreement process, and hash algorithm and encryption techniques are applied. The security and efficiency of the system is improved.
出处 《计算机应用与软件》 CSCD 北大核心 2008年第3期252-253,282,共3页 Computer Applications and Software
关键词 WEB服务器 分散选举 入侵容忍 Byzantine容错 Web server Decentralized voting Intrusion-tolerant Byzantine faults
  • 相关文献

参考文献4

  • 1黄建华,宋国新.入侵容忍技术在身份认证系统中的应用[J].华东理工大学学报(自然科学版),2005,31(3):350-353. 被引量:10
  • 2Verissimo P E, Neves N F, Correia M P. Intrusion-tolerant architectures : Concepts and design. In R Lemos, C Gacek, A Romanovsky,editors, Architecting Dependable Systems, volume 2677 of Lecture Notes in Computer Science[ M ]. Berlin : Springer-Verlag, 2003.
  • 3Wang F, Gong F, Jou F, et al. SITAR: A scalable intrusion tolerance architecture for distributed service[ A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security [ C ]. (united States Military Academy, West Point, New York June 4 - 5 ),2001 : 38-45.
  • 4BYOUNG JOON MIN. Intrusion-Tolerant Server Architecture for Survivable Services. The Journal of Supercomputing,2005 ,33 :93-102.

二级参考文献7

  • 1Wu T. A real-world analysis of Kerberos password security [A]. In Proceedings of the 1999 Network and Distributed System Security Symposium [C]. San Diego, California: NDSS, 1999.97-111.
  • 2Jaynarayan H L. Organically Assured and Survivable Information System (OASIS)[DB/OL].http://www. tolerantsystems.org/, Auguest 2003.
  • 3Kopetz H, Verissimo P. Real Time and Dependability Concepts [M]. New York: Addison-Wesley, 1993.
  • 4Wang F, Gong F, Jou F, et al. SITAR: A scalable intrusion tolerance architecture for distributed service [A]. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security [C]. New York: United States Military Academy, West Point, 2001.38-45.
  • 5Wang X, Heydarri M H. An Intrusion-Tolerant Password Authentication System [A]. 19th Annual Computer Security Applications Conference[C]. New Orleans, Louisiana: IEEE, 2003. 110.
  • 6Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612-613.
  • 7费如纯,王丽娜.基于RSA和单向函数防欺诈的秘密共享体制[J].软件学报,2003,14(1):146-150. 被引量:41

共引文献9

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部