期刊文献+

基于检错编码方法容侵系统中的投票机制研究

Voting Mechanism of Intrusion Tolerant Architecture Based on Error-detection
下载PDF
导出
摘要 SITAR(ScalableIntrusion-TolerantArchitecture)容侵系统模型是由美国DARPA支持的一项研究计划,它的目标是保护COTS(Commercial-Of-The-Shelf)服务器,但该模型投票监视器在投票/裁决之前需要进行结果的复杂转换,才能决定结果的发布者,造成系统的代价较高.文章将分组码的特性应用到SITAR容侵模型的投票机制中去,讨论有效避免在SITAR模型中投票监视器在投票/裁决之前需进行结果的复杂转换的方法. The goal of SITAR (Scalable Intrusion-Tolerant Architecture) project is to protect COTS servers.The SITAR architecture based on an intrusion-tolerance model are decided on a final response through a simple majority voting process for given request.Complex transformations are needed before the voting/adjudication process in the Ballot Monitors can begin.This paper presents major error-control techniques available for voting for SITAR intrusion tolerant model,and discusses an effective method to avoid complex transformations in the Ballot Monitors.
作者 彭文灵
出处 《赣南师范学院学报》 2004年第3期40-43,共4页 Journal of Gannan Teachers' College(Social Science(2))
关键词 检错 编码 容侵系统 投票 error-detection encode intrusion tolerant voting
  • 相关文献

参考文献5

  • 1王丽娜 张焕国 傅建明.网络入侵容忍研究综述[A]..第三届中国信息和通信安全学术论文集[C].北京:科学出版社,2003.39-45.
  • 2史庭俊,朱建明,马建峰.网络系统的安全和容错模型的建立及分析[J].计算机工程与应用,2002,38(14):19-20. 被引量:3
  • 3Y. Deswarte, L. Blain,J. C. Fabre. Intrusion tolerance in distributed computing systems[J ]. In Proc. of the International Symposium on Security and Privacy, IEEE press, May 1991.110~ 121.
  • 4F.Y. Wang, F. M. Gong, S. Chandrarnouli, et al. SITAR: A Scalable Intrusion - Tolerant Architecture [ EB/OL ], http://www. anr. mcnc. org/projects/SITAR/SITAR - norfolk- 2001. pdf, 2001.
  • 5A. Shamir. How to Share a Secret[J ]. Communications of the ACM, 1979,22( 11 ): 612-- 613.

二级参考文献5

  • 1[1]Dan Boneh,Richard A Demillo,Richard J Lipton. On the Importance of Checking Cryptographic Protocol for Faults[C].In:International Conference on the Theory and Application of Cryptographic Techniques,Germany,Springer 1997
  • 2[2]E Ammann,S Jajodia. Computer Security,fault tolerance,and software assurance[J].IEEE Concurrency, 1999 ;7 ( 1 )
  • 3[3]Erland Jonsson. An Integrated Framework for Security and Dependability[C].In:Proceedings of the New Security Paradigms Workshop 1998, Charlottesville, VA, USA, 1998
  • 4[4]J Huang,S Song,L Li et al.An Open Solution to Fault-Tolerance Ethernet:Design,Prototyping,and Evaluation[C].In:IEEE International Performance,computing and communications conference,Arizona,USA,1999
  • 5[5]Stephen Northcutt. Network Intrusion Detection:An Analyst's Handbook[M].New Riders Publishing,USA,1999

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部