期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Quorum systems for intrusion-tolerance based on trusted timely computing base
1
作者 Hua Zhou Xiangru Meng Li Zhang Xiangdong Qiao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期168-174,共7页
Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous qu... Quorum systems have been used to solve the problem of data consistency in distributed fault-tolerance systems. But when intrusions occur, traditional quorum systems have some disadvantages. For example, synchronous quorum systems are subject to DOS attacks, while asynchronous quorum systems need a larger system size (at least 3f+1 for generic data, and f fewer for self-verifying data). In order to solve the problems above, an intrusion-tolerance quorum system (ITQS) of hybrid time model based on trust timely computing base is presented (TTCB). The TTCB is a trust secure real-time component inside the server with a well defined interface and separated from the operation system. It is in the synchronous communication environment while the application layer in the server deals with read-write requests and executes update-copy protocols asynchronously. The architectural hybridization of synchrony and asynchrony can achieve the data consistency and availability correctly. We also build two kinds of ITQSes based on TTCB, i.e., the symmetrical and the asymmetrical TTCB quorum systems. In the performance evaluations, we show that TTCB quorum systems are of smaller size, lower load and higher availability. 展开更多
关键词 network security intrusion-tolerance quorum system trusted timely computing base (TTCB) CONSISTENCY availability.
下载PDF
Atomic multicast protocol for intrusion-tolerance based on trusted timely computing base
2
作者 ZHOU Hua,MENG Xiang-ru,ZHANG Li,QIAO Xiang-dong Telecommunication Engineering Institute,Air Force Engineering University,Xi’an 710077,China 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2009年第6期97-102,共6页
Distributed architecture is often adopted for the intrusion-tolerance system currently.However,this distributed intrusiontolerance system has a consensus problem.To solve this problem,this article explores a distribut... Distributed architecture is often adopted for the intrusion-tolerance system currently.However,this distributed intrusiontolerance system has a consensus problem.To solve this problem,this article explores a distributed intrusion-tolerance system of hybrid time model based on trusted timely computing base(TTCB) and implement an atomic multicast protocol using TTCB services.The TTCB is a trust secure real-time component inside the server,with a well defined interface and separated from the operation system.It is in the synchronous communication environment,while the application layer in the server works asynchronously.By the atomic multicast protocol,it can be achieved that when the servers are over twice the number of faulty servers,the consensus can be satisfied.The performance evaluations show that the proposed protocol can yield larger good throughput with a lower unavailability. 展开更多
关键词 intrusion-tolerance atomic multicast protocol CONSENSUS TTCB network security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部