期刊文献+

基于网络安全的入侵容忍技术研究

The Research of Intrusion Tolerance Technology Based on Network Security
下载PDF
导出
摘要 随着信息化进程的加快,计算机病毒、网络攻击等网络安全问题已成为信息时代人类面临的共同挑战。入侵容忍是网络安全领域的一种新策略,它在系统在遭受攻击时,仍然保证连续地提供服务,即使系统某些部分已被破坏,它也能提供降级服务。本文着重介绍入侵容忍概念,功能特点,展望入侵容忍发展的趋势。 With the acceleration of information process,lots of network security problems,such as computer virus,network attack and so on,have become a challenge that face mankind in this information age.Intrusion Tolerance Technology,which will still keep providing service when the system suffers attacks,is a new measure in the network security area.Even though some part of the system has been broken,it can also provide degraded service.The emphasis of the thesis is to introduce the conception,functions and characteristics of the Intrusion Tolerance Technology,while researching the future of it.
作者 闫秋冬
出处 《信息安全与技术》 2011年第1期20-21,29,共3页
关键词 网络安全 入侵容忍 降级服务 Network Security Intrusion Tolerance Technology Degraded Service
  • 相关文献

参考文献5

二级参考文献25

  • 1[1]Wu T, Malkin M, Boneh D. Building intrusion tolerant applications.Proceedings of the USENIX Security Symposium, 1999:79-91
  • 2[2]Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Communications of the ACM,1978;21(2):120-126
  • 3[5]Shamir A. How to share a secret. Communications of the ACM,1979; 22(11):612-613
  • 4[6]Chor B, GoldWasser S, Micali S, Awerbuch B. Verifiable secret sharing and achieving simultaneity in the presence of faults.Proceedings of 26th IEEE Symposium on Foundations of Computer Science. 1985:251-260
  • 5[7]Pedersen T. Non-interactive and information-theoretic secure verifiable secret sharing. Advances in Cryptology-Crypto' 91. 1991:129-140
  • 6[8]Gennaro R. Theory and practice of verifiable secret sharing. USA:Massachusetts Institute of Technology(MIT), 1996
  • 7[9]Feldman P. A practical scheme for non-interactive verifiable secret sharing. Proceedings of 28th IEEE Symposium on Foundations of Computer Science. 1987:427-437
  • 8[10]Gennaro R, Rabin M, Babin T. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography. Proceedings of 1998 ACM Symposium on Principles of Distributed Computing. Mexico: Puerto Vallarta, 1998:101-111
  • 9[11]Frankel. Y, Gemmell P, MacKenzie. P D, et al. Optimal-resilience proactive public-key cryptosystems. IEEE Symposium on Foundations of Computer Science, 1997: 384-393
  • 10Lin P,Distributed and Parallel Databases,2000年,8卷,1期,7页

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部