高级检索
    田俊峰 肖 冰 马晓雪 王子贤. TDDSS中可信模型及其分析[J]. 计算机研究与发展, 2007, 44(4): 598-605.
    引用本文: 田俊峰 肖 冰 马晓雪 王子贤. TDDSS中可信模型及其分析[J]. 计算机研究与发展, 2007, 44(4): 598-605.
    Tian Junfeng, Xiao Bing, Ma Xiaoxue, and Wang Zixian. The Trust Model and Its Analysis in TDDSS[J]. Journal of Computer Research and Development, 2007, 44(4): 598-605.
    Citation: Tian Junfeng, Xiao Bing, Ma Xiaoxue, and Wang Zixian. The Trust Model and Its Analysis in TDDSS[J]. Journal of Computer Research and Development, 2007, 44(4): 598-605.

    TDDSS中可信模型及其分析

    The Trust Model and Its Analysis in TDDSS

    • 摘要: 可信分布式数据库服务器系统TDDSS(trusted distributed database server system)顺应了目前可信计算的研究从单机到网络的研究趋势,在分布式数据库服务器系统DDSS(distributed database server system)中引入可信机制.分布式系统是一个正处于发展中的系统,许多机制有待进一步研究和完善.在分布式系统中引入可信性存在许多困难,为此对分布式系统开展可信性研究具有重大意义.利用可信技术,引入可信第三方,建立了完整的TDDSS模型和多层次系统信任链模型.在系统管理方面使用了角色管理机制.与此同时,改进了相应的系统认证和日志管理体系.为今后可信在计算机系统中的应用提供了完整的可靠模型,并对建立的TDDSS模型进行了整体的数学评估和科学检测.

       

      Abstract: A new model—trusted distributed database server system (TDDSS) is presented in this paper. This new model breaks the situation in which trusted computing is always applied in PC. It introduces trusted mechanism from PC into distributed database server system (DDSS). And this model helps to find out a new application area for the trusted computing. Also set up are a complete model of TDDSS and the layers of trusted-chain in trusted distributed database server system with trusted computing technology. Trusted-chain presents assurance for the transfer of the trust. It transfers from the trusted root to the interior of the system. Role-based mechanism, which is recognized by more and more people, is posed in management in TDDSS. It defines a role for every client server, and role-based mechanism proposes a more flexible and scalable permission management model. At the same time, the mechanisms of authentication and log are improved in this system. Especially, two-level of logs is used in TDDSS. It improves the security and makes the information seeking much easier. In conclusion, a complete model for the application of trusted computing in computing systems is given. Furthermore the whole system model is evaluated with mathematics method, and its feasibility and efficiency are proved accurately.

       

    /

    返回文章
    返回