期刊文献+

层次化可信网络等级划分策略研究

Research on Grade Division Policy in Hiberarchy Trusted Network
原文传递
导出
摘要 提出了一种基于等级划分的层次化可信网络框架,详细说明了可信属性的划分规则和可信等级的评估方法,着重指出了该框架在可信网络中的实际应用。另外,给出了在层次化可信网络中终端的接入过程。仿真实验表明,该框架在保证网络系统安全性和可信性的同时,能够增加终端接入网络的灵活性,并为各厂商可信网络设备的互联、互通和互操作提供支撑。 A framework of hiberarchy trusted network based on the grade division was put forward, and the partition rules of trusted attributes as well as the methods of grade division were explained in detail. Moreover, the potential applications of this framework in trusted network was discussed, and the access procedure of terminals in hiberarchy trusted network was given. Simulations results show that by the proposed framework, not only the safety and reliability of network can be ensured, but also the flexibility of ways to access network is strengthened, and that it can provide support for interoperability of different equipment manufacturers.
作者 邵丹 程学军
出处 《武汉理工大学学报》 CAS CSCD 北大核心 2009年第18期200-204,共5页 Journal of Wuhan University of Technology
关键词 可信网络 层次化可信网络 可信属性 等级划分 trusted network hiberarchy trusted network trusted attribute grade division
  • 相关文献

参考文献9

  • 1MARK C. Trusted Computing-Closing That Lingering Doubt[J]. Network Security, 2006, 2006(6) : 13-15.
  • 2SIEWIOREK Daniel P.,杨孝宗,CHILLAREGE Ram,KALBARCZYK Zbigniew T..可信计算的产业趋势和研究(英文)[J].计算机学报,2007,30(10):1645-1661. 被引量:9
  • 3SESHADRI A, LUK M, PERRIG A, et al. Externally Verifiable Code Execution[J]. Commununications of the ACM, 2006, 49(9) : 45-49.
  • 4GASMI Y, SADEGHI A R, STEWIN P, et al. Beyond Secure Channels[ C ]//Proceedings of the 2007 ACM Workshop on Sealable Trusted Computing. Alexandria, Virginia, USA. ACM, New York NY USA, 2007. 30-40.
  • 5CHEN L, ZHANG H G, ZHANG L Q, et al. A New Information MeastLrement Scheme Based on TPM for Trusted Network Access[ C] //Proceedings of the 2007 International Conference on Computational Intelligence and Security Workshops. Harbin, China. IEEE, NW Washington, DC USA, 2007. 506-509.
  • 6LUO A A, LIN C, CHEN Z, et al. TNC-compatible NAC System Implemented on Network Processor[ C]//Proceedings of the 32nd Conference on local Computer Networks. Clontarf Castle, Dublin, Ireland. IEEE, NW Washington, DC USA, 2007. 1069-1075.
  • 7BALACHEFF B, CHEN L, PEARSON S, et al. Trusted Computing Platforms: TCPA Technology in Context[M]. Prentice Hall PTR, Upper Saddle River, 2002.
  • 8ENGLAND P, LAMPSON B W, MANFERDELLI J, et al. A Trusted Open Plafform[J]. IEEE Computer, 2003, 36(7) : 55-62.
  • 9PEINADO M, CHEN Y, ENGLAND P, et al. NGSCB: A Trusted Open System[ C] ffProceedings of Information Security and Privacy. Sydney, Australia. Springer, 2004. 86-97.

二级参考文献65

  • 1Sellers F,Hsiao M,Bearnson L.Error Detecting Logic for Digital Computers.New York:McGraw-Hill Book Co.,1968.
  • 2Avizienis A.Design of fault-tolerant computers//Proceedings of the Fall Joint Computer Conference.Washington D.C.:Thompson Books,1967,31:733-743.
  • 3Hsiao M et al.Reliability,availability,and serviceability of IBM computer systems:A quarter century of progress.IBM Journal Research and Development,1981,25(5):453-465.
  • 4Normand E.Single event upset at ground level.IEEE Transactions on Nuclear Science,1996,43:.
  • 5Ziegler J et al.IBM's experiments in soft fails in computer.IBM Journal of Research and Development,1996,40 (1):3-18.
  • 6Faccio F et al.Single event effects in static and dynamic registers in a 0.25μm CMOS technology.IEEE Transactions on Nuclear Science,1999,46(6):1434-1439.
  • 7Spainhower L,Gregg T.IBM S/390 parallel enterprise server G5 fault tolerance:A historical perspective.IBM Journal of Research and Development,1999,43(5/6):863-873.
  • 8Spainhower L et al.IBM's ES/9000 model 982's fault-tolerant design for consolidation.IEEE Micro,1994,14(1):48-59.
  • 9Intel Corp.Intel's Quality System Databook.January 1998,No.210997-007.
  • 10Arlat J et al.Fault injection for dependability validation:A methodology and some applications.IEEE Transactions on Software Engineering,1990,16(2):166-182.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部