期刊文献+

基于安全基片的可重构网络安全管控机制 被引量:6

Security Substrate Based Security Management and Control Mechanism of Reconfigurable Network
下载PDF
导出
摘要 对下一代互联网安全体系架构进行了分析探讨,重点研究了已有网络体系架构的特点及面临的安全挑战,界定了可重构网络体系的安全目标,并提出了基于安全基片的可重构网络安全管控机制。同时,给出了安全基片定义以及基于安全基片的可重构网络安全模型,并对多级安全等级的安全服务构造、基于安全基片动态构建安全服务等可重构网络安全管控的关键环节进行了深入阐述。 The next generation internet security architectures were analyzed and the characteristics and security challenges of the existing network were studied. The security goals of reconfigurable network were defined, and the "security substrate" based security management and control mechanism of reconfigurable network was presented. The definition of "security substrate" was given and the corresponding reconfigurable networks security model was illustrated. The construction of security services with multilevel security structure and security service establishment process via "security substrate" were put forward, which were key components of the security management and control architecture of reconfigurable network.
出处 《电信科学》 北大核心 2014年第7期19-25,共7页 Telecommunications Science
基金 国家重点基础研究发展计划("973"计划)基金资助项目(No.2012CB315905) 国家自然科学基金资助项目(No.61272501)
关键词 下一代互联网设计 可重构网络 安全基片 动态安全模型 next generation internet design, reeonfigurable network, security substrate, dynamic security model
  • 相关文献

参考文献6

二级参考文献98

  • 1龚正虎,傅彬,卢泽新.软件集群路由器体系结构的研究[J].国防科技大学学报,2006,28(3):40-43. 被引量:5
  • 2吴建平,徐恪.Research on Next-Generation Internet Architecture[J].Journal of Computer Science & Technology,2006,21(5):723-731. 被引量:7
  • 3张宏科,苏伟.新网络体系基础研究——一体化网络与普适服务[J].电子学报,2007,35(4):593-598. 被引量:126
  • 4Floyd S. High-Speed TCP for large congestion windows. RFC3649, 2003.
  • 5DataTAG. http://datatag.web.cern.ch/datatag/networking.html
  • 6Corson MS. Internet-Based mobile ad hoc networking. IEEE Internet Computing, 1999. 63-70.
  • 7Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 2002,38:393-422.
  • 8Estrin D, Govindan R, Heidemann J, Kumar S. Next century challenges: Scalable coordinate in sensor network. In: Proc. of the 5th ACM/IEEE Int'l Conf. on Mobile Computing and Networking. 1999. 263-270.
  • 9Saltzer H, Reed DP, Clark D. End to end argument in system design. ACM Trans. on Computing System, 1984,2(4):277-288.
  • 10Tennenhouse DL, Wetherall D. Towards an active network architecture. Computer Communication Review, 1996,26(2):21-28.

共引文献261

同被引文献62

  • 1赵长军.骨伤专科医院在常态化疫情防控下提升患者满意度的做法与思考[J].医药论坛杂志,2021,42(11):143-145. 被引量:2
  • 2张路一.基于SDN架构浅谈空管运维新趋势[J].信息通信,2019,32(12):141-142. 被引量:1
  • 3Elliott C. GENI: Opening Up New Classes of Experiments in Global Networking[ J ]. IEEE Internet Computing, 2010(14).
  • 4Zhang X, Hsiao H C, Hasker G, et al. SCION: Sealability, Control, and Isolation on Next-Generation Networks [C ]/2011 IEEE Sympo- sium on Security and Privacy IEEE Computer Society, 2011:212-227.
  • 5Clark D D, Wroclawski J, Sollins K R, et al. Tussle in cyberspace: de- fining tomorrow's intemet [J]. IEEE/JACM Transactions on Network- ing, 2005,13(3):462-475.
  • 6Security requirements for NGN release 1 : ITU- T Y.2701 [S/OL]. [2015-10-25 ]. http://www.itu.int/rec.
  • 7Functional requirements and architecture of next generation net- works :ITU-T Y.2012[S/OL]. [2015-10-25]. http://www.itu.int/ree.
  • 8Meyer D, Zhang L, Fall K. Report from the lAB workshop in routing and addressing[EB/OL]. [2015-10-25]. http://www.rfc-editor.org/ rfc/rfc4984.txt.
  • 9Bellovin SM. A look back at security problems in the TCP/IP protocol suite [ C ]//Computer Security Applications Conference, 2005.
  • 10新一代4GLTE架构的安全隐患[EB/OL].[2015-08-22].http://network.chinabyte.com/125/12631125.shtml.

引证文献6

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部