• DocumentCode
    2906136
  • Title

    Architecture of Trustworthy Networks

  • Author

    Peng, Xue-Hai ; Lin, Chuang

  • Author_Institution
    Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
  • fYear
    2006
  • fDate
    Sept. 29 2006-Oct. 1 2006
  • Firstpage
    269
  • Lastpage
    276
  • Abstract
    Existing isolated and add-on secure systems are rarely robust under attack, misoperation and internal faults. Secure communication only offers little protection if one ore more components are compromised, and are not sufficient for holistic and systemic security. This paper proposes the concept of trustworthy networks, which makes advances along these traditional researches on network security in combination. We outline the key challenges in constructing trustworthy networks, and define three properties, namely security, survivability and controllability. Consulting human interactions, the abstract architecture for trustworthy networks is proposed, depicting protocols layers, topology structure, entities and components, and protocol steps
  • Keywords
    computer networks; protocols; security of data; add-on secure systems; network security; trustworthy networks; Authentication; Communication system security; Computer architecture; Computer networks; Humans; IP networks; Information security; Internet; Protocols; Quality of service;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on
  • Conference_Location
    Indianapolis, IN
  • Print_ISBN
    0-7695-2539-3
  • Type

    conf

  • DOI
    10.1109/DASC.2006.20
  • Filename
    4030892