期刊文献+

网络发展及其更广泛的安全需求

The Network Development and Its Broader Security Requirement
下载PDF
导出
摘要 简要评述了网络应用技术与理论发展的图景,在此背景下进一步讨论了网络化系统的可依赖性问题。可依赖性作为比安全性更为广泛的安全概念,对其深入理解将有助于更好地审视未来应用的潜在需求。对于未来以网络为中心的军事应用,研究具有可依赖性的网络化系统已经成为当务之急,先行的理论和实验研究在今天尤为迫切。然而,可依赖性的研究无法脱离当前网络科学的现状,通过引述美国科学研究委员会(NRC)受军方委托于2006年形成的《Network Science》报告,扼要说明相关的研究方向与未来的研究挑战。 The development of application technologies and theories in network engineering is first briefly reviewed. The dependability of networked systems as a boarder security conception is further introduced, which will redound to the better understanding of potential requirements of network applications. For future network-centre operations, conducting theoretical and experimental research on the dependable networked systems has become an urgent need. We show that there are still a few big challenges ahead, as presented in 2006 released NRC report, Network Science, which was supported by the US army.
作者 袁坚 王钺
出处 《中国电子科学研究院学报》 2008年第6期551-557,共7页 Journal of China Academy of Electronics and Information Technology
基金 国家973计划(2007CB307100 2007CB307105) 国家自然科学基金(60674048 60603068 60672142 60672107 60772053)
关键词 网络化系统 安全性 可依赖性 网络科学 networked systems security dependability network science
  • 相关文献

参考文献39

  • 1[1]BULLOCK S,CLIFF D.Complexity and Emergent Behaviour in ICT Systems[R].HPL-2004-187,2004.
  • 2[2]LABOVITZ C,MALAN G R,JAHANIAN F.Internet Routing Instability[J].IEEE/ACM Trans.Networking,1998,6(5):515-528.
  • 3[3]COWIE J,OGIELSKI A.Global Routing Instabilities During Code Red.Ⅱ and Nimda Worm Propagation[R].NANOG 23,2001.
  • 4[4]PERROW C.Normal Accidents:Living with High-Risk Technologies[M].Princeton:Princeton University Press,1999.
  • 5[5]ELLISON R J,FISCHER D A,LINGER R C,et al.Survivable Network Systems:An Emerging Discipline[R].Technical Report CMU/SEI-97-TR-OI3,1999.
  • 6[6]SCHNEIDER F.Trust in Cyberspace[M].Washington:National Academy Press,1999.
  • 7[7]AVIZIENIS A,LAPRIE J-C,RANDELL B,et al.Basic Concepts and Taxonomy of Dependable and Secure Computing[J].IEEE Transactions on Dependable and Secure Computing,2004,1:11-33.
  • 8[8]PIERCE W H.Failure-Tolerant Computer Design[M].Washington:Academic Press,1965.
  • 9[9]National Research Council.Network Science,Committee on Network Science for Future Army Applications[M].Washington:National Academies Press,2006.
  • 10[10]MOORE D,VOELKER G,SAVAGE S.Inferring Internet Denial of Service Activity[C].Proceedings of the USENIX Security Symposium,Washington,DC,USA,2001:9-22.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部