首页> 外文会议>Proceedings of the 3rd International DiscCoTec Workshop on Middleware-Application Interaction >Functional decomposition and interactions in hybrid intrusion-tolerant systems
【24h】

Functional decomposition and interactions in hybrid intrusion-tolerant systems

机译:混合入侵容忍系统中的功能分解和交互

获取原文
获取原文并翻译 | 示例

摘要

Hybrid wormhole-based architectures have recently been proposed as an approach for building intrusion-tolerant systems. The wormhole, a trusted entity in the system, can be implemented in software using virtualization technology. The architecture of such systems poses the question of distribution of functionality and interactions between three layers: the trusted wormhole, the untrusted part of the replication infrastructure, and the replicated application. For example, a total-ordering service for client requests that is needed for consistent replication can be implemented in the trusted or untrusted part of the infrastructure. In this paper, we discuss this distribution of functionality and the impact on semantics, interfaces, and functional constraints. Finally, we propose a flexible toolkit that eases the implementation and comparison of different architectures.
机译:最近已经提出了基于混合虫洞的体系结构作为构建入侵容忍系统的方法。虫洞是系统中的一个受信任实体,可以使用虚拟化技术在软件中实现。这样的系统的体系结构提出了功能分布和交互作用的三层问题:受信任的虫洞,复制基础结构的不受信任的部分以及复制的应用程序。例如,可以在基础结构的受信任或不受信任的部分中实现一致复制所需的针对客户端请求的总订购服务。在本文中,我们讨论了功能的这种分布及其对语义,接口和功能约束的影响。最后,我们提出了一个灵活的工具包,可以简化不同体系结构的实现和比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号