期刊文献+

网络系统的安全和容错模型的建立及分析 被引量:3

Building and Analysis of the Model of Security and Fault Tolerance of Network
在线阅读 下载PDF
导出
摘要 目前,人们在解决计算机的安全和容错问题时,常常将它们分别进行处理。文章通过网络系统安全和容错模型,提出了在计算机系统中,安全和容错是相互联系和互相影响的。在设计系统时,如果仍然采用传统的方法,将安全和容错孤立起来看待来解决安全和容错问题是不全面的。事实上,安全技术和容错技术的目的和方法有些是相同的。这样的关系要求人们在解决这两个问题时应将它们结合起来加以综合研究。若采取有效的措施解决好这个问题,计算机系统的整体性能将会有很大的提高。 The need for highly secure,highly dependable computer systems is acute in today's world.However,frequently security and fault-tolerance are looked at in isolation to each other,as two separate issues.In this paper,the authors contend that there are areas where the both goals and methods overlap,and that there is a large benefit to be gained by examining the two in relation to one another.This paper is intended to expand on this viewpoint and give convincing arguments for is support.The authors believe that the performance of security and fault-tolerance of the computer system will be enhanced if they consider the impact each can have on the other.
出处 《计算机工程与应用》 CSCD 北大核心 2002年第14期19-20,24,共3页 Computer Engineering and Applications
基金 中国科学院研究生院信息安全国家重点实验室资金资助
关键词 计算机安全 计算机网络系统 入侵检测 安全 容错模型 Computer Security,Fault Tolerance,Model
  • 相关文献

参考文献5

  • 1[1]Dan Boneh,Richard A Demillo,Richard J Lipton. On the Importance of Checking Cryptographic Protocol for Faults[C].In:International Conference on the Theory and Application of Cryptographic Techniques,Germany,Springer 1997
  • 2[2]E Ammann,S Jajodia. Computer Security,fault tolerance,and software assurance[J].IEEE Concurrency, 1999 ;7 ( 1 )
  • 3[3]Erland Jonsson. An Integrated Framework for Security and Dependability[C].In:Proceedings of the New Security Paradigms Workshop 1998, Charlottesville, VA, USA, 1998
  • 4[4]J Huang,S Song,L Li et al.An Open Solution to Fault-Tolerance Ethernet:Design,Prototyping,and Evaluation[C].In:IEEE International Performance,computing and communications conference,Arizona,USA,1999
  • 5[5]Stephen Northcutt. Network Intrusion Detection:An Analyst's Handbook[M].New Riders Publishing,USA,1999

同被引文献7

  • 1张春霞.我国会计电算化的发展问题分析和前景瞻望[J].经济师,2006(5):226-226. 被引量:5
  • 2Y. Deswarte, L. Blain,J. C. Fabre. Intrusion tolerance in distributed computing systems[J ]. In Proc. of the International Symposium on Security and Privacy, IEEE press, May 1991.110~ 121.
  • 3F.Y. Wang, F. M. Gong, S. Chandrarnouli, et al. SITAR: A Scalable Intrusion - Tolerant Architecture [ EB/OL ], http://www. anr. mcnc. org/projects/SITAR/SITAR - norfolk- 2001. pdf, 2001.
  • 4A. Shamir. How to Share a Secret[J ]. Communications of the ACM, 1979,22( 11 ): 612-- 613.
  • 5王丽娜 张焕国 傅建明.网络入侵容忍研究综述[A]..第三届中国信息和通信安全学术论文集[C].北京:科学出版社,2003.39-45.
  • 6肖连兵,黄林鹏.网格计算综述[J].计算机工程,2002,28(3):1-3. 被引量:55
  • 7何炎祥,范清风,张力飞.网格计算中动态复制策略的设计[J].计算机工程,2004,30(3):94-95. 被引量:13

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部