首页 | 本学科首页   官方微博 | 高级检索  
     

Trustworthiness Technologies of DDSS
引用本文:TIAN Junfeng XIAO Bing WANG Zixian ZHANG Yuzhu. Trustworthiness Technologies of DDSS[J]. 武汉大学学报:自然科学英文版, 2006, 11(6): 1853-1856. DOI: 10.1007/BF02831891
作者姓名:TIAN Junfeng XIAO Bing WANG Zixian ZHANG Yuzhu
作者单位:[1]Institute of Network Technology, Hebei University, Baoding 071002, Hebei, China [2]Xingtai Municipal Bureau of Radio and Television, Xingtai 054000, Hebei, China
摘    要:The most significant strategic development in information technology over the past years has been "trusted computing" and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system.

关 键 词:信任计算 分布式数据库 信任授权 信任链 DDSS
文章编号:1007-1202(2006)06-1853-04
收稿时间:2006-05-20

Trustworthiness technologies of DDSS
Tian Junfeng,Xiao Bing,Wang Zixian,Zhang Yuzhu. Trustworthiness technologies of DDSS[J]. Wuhan University Journal of Natural Sciences, 2006, 11(6): 1853-1856. DOI: 10.1007/BF02831891
Authors:Tian Junfeng  Xiao Bing  Wang Zixian  Zhang Yuzhu
Affiliation:(1) Institute of Network Technology, Hebei University, 071002 Baoding, Hebei, China;(2) Xingtai Municipal Bureau of Radio and Television, 054000 Xingtai, Hebei, China
Abstract:The most significant strategic development in information technology over the past years has been “trusted computing” and trusted computers have been produced. In this paper trusted mechanisms adopted by PC is imported into distributed system, such as chain of trust, trusted root and so on. Based on distributed database server system (DDSS), a novel model of trusted distributed database server system (TDDSS) is presented ultimately. In TDDSS role-based access control, two-level of logs and other technologies are adopted to ensure the trustworthiness of the system. Foundation item: Supported by the Natural Science Foundation of Hebei Province (F2004000133) Biography: TIAN Junfeng (1965-), male, Professor, Ph.D., research direction: distributed computing and network security.
Keywords:trusted computing  trusted distributed database  trusted authorization  chain of trust
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号