Research on network architecture with trustworthiness and controllability

被引:20
作者
Lin, Chuang [1 ]
Peng, Xue-Hai [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
network architecture; trustworthiness; security; controllability; cross layer;
D O I
10.1007/s11390-006-0732-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.
引用
收藏
页码:732 / 739
页数:8
相关论文
共 30 条
[1]  
ALGRIDAS A, 2004, IEEE T DEPEND SECURE, V1, P11
[2]  
[Anonymous], 2004, WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security, DOI DOI 10.1145/1023646.1023648
[3]   Adaptive cyberdefense for survival and intrusion tolerance [J].
Atighetchi, M ;
Pal, P ;
Webber, F ;
Schantz, R ;
Jones, C ;
Loyall, J .
IEEE INTERNET COMPUTING, 2004, 8 (06) :25-33
[4]  
BLU MS, 2001, ACM T INTERNET TECHN, V1, P70
[5]  
BRADEN R, DEV NEXT GENERATION
[6]  
CAMP LJ, 2003, LECT NOTES ARTIFICIA
[7]  
Chuang S, 2005, ECONTENT, V28, P5
[8]  
Clark D., NEW VISION NETWORK A
[9]  
Ellison R. J., 2003, P 3 ANN HIGH CONF SO
[10]  
Eschenauer L, 2004, LECT NOTES COMPUT SC, V2845, P47