咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Trustworthiness Technologies o... 收藏

Trustworthiness Technologies of DDSS

Trustworthiness Technologies of DDSS

作     者:TIAN Junfeng XIAO Bing WANG Zixian ZHANG Yuzhu 

作者机构:Institute of Network Technology Hebei University Baoding 071002 Hebei China Xingtai Municipal Bureau of Radio and Television Xingtai 054000 Hebei China 

出 版 物:《Wuhan University Journal of Natural Sciences》 (武汉大学学报(自然科学英文版))

年 卷 期:2006年第11卷第6期

页      面:1853-1856页

学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Supported by the Natural Science Foundation ofHebei Province (F2004000133) 

主  题:trusted computing trusted distributed database trusted authorization chain of trust 

摘      要:The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分