期刊文献+

一种面向服务的入侵容忍方案的设计与实现

Design and Implementation of Services-oriented Intrusion-tolerant
下载PDF
导出
摘要 分析了入侵与故障的区别,指出在安全领域直接使用容错方法存在模型上的不可行性。提出了一种面向特定服务的入侵容忍方法。这种方法关注的是入侵的结果而不是入侵本身,即在保证系统功能连续的情况下,利用门限密码以及大数表决等技术检测入侵的存在,然后用容错技术重构和恢复受攻击的系统。详细介绍了这种面向特定服务的入侵容忍方法的信任模型,讨论了系统的初步实现。 It is infeaseible to apply fault-tolerant directly in the security tolerant-specific services-oriented method is presented. It can integrate the fa paradigm. A novel methord of intrusion uh tolerant into security paradigm. The traditional fault tolerant method focuses on the causes and existence of fault, and so can deal with unknown intrusion. In this method, both verifiable secret sharing and major voting are used to detect the effects of intrusion and fault-tolerant approaches. Its model and architecture are presented and some further research directions are introduced.
出处 《科学技术与工程》 2009年第4期1047-1050,共4页 Science Technology and Engineering
关键词 面向服务 入侵容忍 系统失效 services-oriented intrusion-tolerant systems failure
  • 相关文献

参考文献4

二级参考文献46

  • 1李家春,李之棠.分布式入侵告警关联分析[J].计算机研究与发展,2004,41(11):1919-1923. 被引量:6
  • 2[1]Gemmell, P.S. An introduction to threshold cryptography. CryptoBytes, 1977,2(7):7~12.
  • 3[2]Wu, T., Malkin, M., Boneh, D. Building intrusion-tolerant applications. In: Proceedings of the USENIX Security Symposium. 1999. 79~91.
  • 4[3]Shoup, V. Practical threshold signatures. In: Proceedings of the Eurocrypt 2000. Bruges (Brugge): Springer-Verlag, 2000. 207~220.
  • 5[4]Frankel, Y., Gemmell, P., MacKenzie, P.D., et al. Optimal-Resilience proactive public-key cryptosystems. In: IEEE Symposium on Foundations of Computer Science. 1997. 384~393.
  • 6[1]Wu T, Malkin M, Boneh D. Building intrusion tolerant applications.Proceedings of the USENIX Security Symposium, 1999:79-91
  • 7[2]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM,1978;21(2):120-126
  • 8[5]Shamir A. How to share a secret. Communications of the ACM,1979; 22(11):612-613
  • 9[6]Chor B, GoldWasser S, Micali S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of 26th IEEE Symposium on Foundations of Computer Science. 1985:251-260
  • 10[7]Pedersen T. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptology-Crypto' 91. 1991:129-140

共引文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部