Trustworthiness Technologies of DDSS
Trustworthiness Technologies of DDSS作者机构:Institute of Network Technology Hebei University Baoding 071002 Hebei China Xingtai Municipal Bureau of Radio and Television Xingtai 054000 Hebei China
出 版 物:《Wuhan University Journal of Natural Sciences》 (武汉大学学报(自然科学英文版))
年 卷 期:2006年第11卷第6期
页 面:1853-1856页
学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)]
基 金:Supported by the Natural Science Foundation ofHebei Province (F2004000133)
主 题:trusted computing trusted distributed database trusted authorization chain of trust
摘 要:The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.