首页> 外文会议>International Conference on Computer Engineering and Technology >Research on Secure Key Techniques of Trustworthy Distributed System
【24h】

Research on Secure Key Techniques of Trustworthy Distributed System

机译:值得信赖的分布式系统安全关键技术研究

获取原文

摘要

To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and inbreak. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.
机译:为了实现加强分布式系统的可信度和可控性的目标,应充分施加安全算法和芯片的核心功能。通过构建分布式系统和用户行为之间的值得信赖的模型,构建可信赖的分布式系统的架构,加强服务的生存能力,加强分布式系统的可管理性,分布式系统的安全问题是根本解决。通过建立值得信赖的计算环境并根据标识和行为为值得信赖的分布式系统提供值得信赖的验证和主动保护,我们将达到捍卫不知不行病毒和破产的目标。该研究坚持认为,安全,可控性,可管理性和生存能力应该是值得信赖的分布式系统的基本属性。研究了这些属性的关键思想和技术,并进行了接受过最近的发展和进展。与此同时,简要讨论了技术趋势和挑战。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号