Research on network architecture with trustworthiness and controllability

被引:20
作者
Lin, Chuang [1 ]
Peng, Xue-Hai [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
network architecture; trustworthiness; security; controllability; cross layer;
D O I
10.1007/s11390-006-0732-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements. After reviewing the lessons and experiences of success and failure in the Internet and summarizing related work, we analyze the basic targets of providing trustworthiness and controllability. Then, the anticipant architecture is introduced. Based on the resulting design, several trustworthy and controllable mechanisms are also discussed.
引用
收藏
页码:732 / 739
页数:8
相关论文
共 30 条
[11]  
Felten E. W., 2003, IEEE Security & Privacy, V1, P60, DOI 10.1109/MSECP.2003.1203224
[12]  
GANERIWAL S, 2004, NESL TECHNICAL REPOR
[13]   A clean slate 4D approach to network control and management [J].
Greenberg, A ;
Hjaimtysson, G ;
Maltz, DA ;
Myers, A ;
Rexford, J ;
Xie, G ;
Yan, H ;
Zhan, JB ;
Zhang, H .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2005, 35 (05) :41-+
[14]   A survey of secure wireless ad hoc routing [J].
Hu, YC ;
Perrig, A .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :28-39
[15]  
Lin Chuang, 2004, Journal of Software, V15, P1815
[16]  
MATTHEW C, DESIGN IMPLEMENTATIO
[17]   Towards a model for trust relationships in virtual enterprises [J].
Mezzetti, N .
14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, :420-424
[18]  
NEUMANN PG, PRINCIPLED ASSUREDLY
[19]  
Papalilo E, 2004, LECT NOTES COMPUT SC, V3270, P94
[20]   Cross-layer design optimizations in wireless protocol stacks [J].
Raisinghani, VT ;
Iyer, S .
COMPUTER COMMUNICATIONS, 2004, 27 (08) :720-724