DocumentCode :
2906136
Title :
Architecture of Trustworthy Networks
Author :
Peng, Xue-Hai ; Lin, Chuang
Author_Institution :
Dept. of Comput. Sci. & Technol., Tsinghua Univ., Beijing
fYear :
2006
fDate :
Sept. 29 2006-Oct. 1 2006
Firstpage :
269
Lastpage :
276
Abstract :
Existing isolated and add-on secure systems are rarely robust under attack, misoperation and internal faults. Secure communication only offers little protection if one ore more components are compromised, and are not sufficient for holistic and systemic security. This paper proposes the concept of trustworthy networks, which makes advances along these traditional researches on network security in combination. We outline the key challenges in constructing trustworthy networks, and define three properties, namely security, survivability and controllability. Consulting human interactions, the abstract architecture for trustworthy networks is proposed, depicting protocols layers, topology structure, entities and components, and protocol steps
Keywords :
computer networks; protocols; security of data; add-on secure systems; network security; trustworthy networks; Authentication; Communication system security; Computer architecture; Computer networks; Humans; IP networks; Information security; Internet; Protocols; Quality of service;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable, Autonomic and Secure Computing, 2nd IEEE International Symposium on
Conference_Location :
Indianapolis, IN
Print_ISBN :
0-7695-2539-3
Type :
conf
DOI :
10.1109/DASC.2006.20
Filename :
4030892
Link To Document :
بازگشت