Research on Secure Key Techniques of Trustworthy Distributed System

Ming He,Aiqun Hu,Hangping Qiu
DOI: https://doi.org/10.1109/ICCET.2009.100
2009-01-01
Abstract:To arrive at the goal of intensifying the trustworthiness and controllability of distributed systems, the core function of secure algorithms and chips should be fully exerted. Through building the trustworthy model between distributed system and user behaviors, constructing the architecture of trustworthiness distributed systems, intensifying the survivability of services, and strengthening the manageability of distributed systems, the secure problem of distributed systems is to be radically solved. By setting up the trustworthy computing circumstance and supplying the trustworthy validation and the active protection based on identity and behavior for trustworthy distributed system, we will reach the goal of defending the unaware viruses and in break. This research insists that the security, controllability, manageability, and survivability should be basic properties of a trustworthy distributed system. The key ideas and techniques involved in these properties are studied, and recent developments and progresses are surveyed. At the same time, the technical trends and challenges are briefly discussed.
What problem does this paper attempt to address?