DocumentCode
2906136
Title
Architecture of Trustworthy Networks
Author
Peng, Xue-Hai ; Lin, Chuang
Author_Institution
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
fYear
2006
fDate
Sept. 29 2006-Oct. 1 2006
Firstpage
269
Lastpage
276
Abstract
Existing isolated and add-on secure systems are rarely robust under attack, misoperation and internal faults. Secure communication only offers little protection if one ore more components are compromised, and are not sufficient for holistic and systemic security. This paper proposes the concept of trustworthy networks, which makes advances along these traditional researches on network security in combination. We outline the key challenges in constructing trustworthy networks, and define three properties, namely security, survivability and controllability. Consulting human interactions, the abstract architecture for trustworthy networks is proposed, depicting protocols layers, topology structure, entities and components, and protocol steps
Keywords
computer networks; protocols; security of data; add-on secure systems; network security; trustworthy networks; Authentication; Communication system security; Computer architecture; Computer networks; Humans; IP networks; Information security; Internet; Protocols; Quality of service;
fLanguage
English
Publisher
ieee
Conference_Titel
Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on
Conference_Location
Indianapolis, IN
Print_ISBN
0-7695-2539-3
Type
conf
DOI
10.1109/DASC.2006.20
Filename
4030892
Link To Document