Research on Trustworthy Distributed System

Full Text (PDF, 191KB), PP.41-47

Views: 0 Downloads: 0

Author(s)

LUO Chen 1,* HE Ming 1 LIU Xiao-Ming 1 Li Yuan 2

1. Institute Command Automation PLAUST, Nanjing, China

2. NO.73685 Troop, PLA, Nanjing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2012.03.07

Received: 1 Mar. 2012 / Revised: 6 Apr. 2012 / Accepted: 8 May 2012 / Published: 15 Jun. 2012

Index Terms

Trustworthiness, trustworthy distributed system, controllability, survivability

Abstract

To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.

Cite This Paper

LUO Chen,HE Ming,LIU Xiao-Ming,LI Yuan,"Research on Trustworthy Distributed System", IJWMT, vol.2, no.3, pp.41-47, 2012. DOI: 10.5815//ijwmt.2012.03.07

Reference

[1]Cyber Trust [EB/OL]. http://www.nap.edu/catalog/6161.html,2006.

[2]LIN Chuang, REN Fengyuan. New network with trustworthiness and controllability as well as expansibility[J]. Software Journal, 2004, 15(12): 1815-1821. (in Chinese)

[3]LIN Chuang, PENG Xuehai. Research on network architecture with trustworthiness and controllability[J]. Journal of Computer Science and Technology, 2006, 21(5): 732-739.

[4]LIN Chuang, PENG Xuehai. Research on trustworthiness of network[J]. Computer Journal, 2005, 28(5): 751-758. (in Chinese)

[5]LIN Chuang, WANG Yang, LI Linquan. Random model method and evaluation technology of network security[J]. Computer Journal, 2005, 28(12): 1943-1956. (in Chinese)

[6]TIAN Junfeng, XIAO Bing, MA Xiaoxue, et.al. Trustworthy model and analysis in TDDSS[J]. Computer research and development. 2007, 44(4): 598-605. (in Chinese)

[7]SHEN Changxiang, ZHANG Huanguo, FENG Dengguo, et.al, Summarazation of information security[J]. China Science: E(Information Science), 2007, 37(2): 129-150.