• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Tian Junfeng, Xiao Bing, Ma Xiaoxue, and Wang Zixian. The Trust Model and Its Analysis in TDDSS[J]. Journal of Computer Research and Development, 2007, 44(4): 598-605.
Citation: Tian Junfeng, Xiao Bing, Ma Xiaoxue, and Wang Zixian. The Trust Model and Its Analysis in TDDSS[J]. Journal of Computer Research and Development, 2007, 44(4): 598-605.

The Trust Model and Its Analysis in TDDSS

More Information
  • Published Date: April 14, 2007
  • A new model—trusted distributed database server system (TDDSS) is presented in this paper. This new model breaks the situation in which trusted computing is always applied in PC. It introduces trusted mechanism from PC into distributed database server system (DDSS). And this model helps to find out a new application area for the trusted computing. Also set up are a complete model of TDDSS and the layers of trusted-chain in trusted distributed database server system with trusted computing technology. Trusted-chain presents assurance for the transfer of the trust. It transfers from the trusted root to the interior of the system. Role-based mechanism, which is recognized by more and more people, is posed in management in TDDSS. It defines a role for every client server, and role-based mechanism proposes a more flexible and scalable permission management model. At the same time, the mechanisms of authentication and log are improved in this system. Especially, two-level of logs is used in TDDSS. It improves the security and makes the information seeking much easier. In conclusion, a complete model for the application of trusted computing in computing systems is given. Furthermore the whole system model is evaluated with mathematics method, and its feasibility and efficiency are proved accurately.
  • Related Articles

    [1]Liu Lei, Shi Zhiguo, Su Haoru, and Li Hong. Image Segmentation Based on Higher Order Markov Random Field[J]. Journal of Computer Research and Development, 2013, 50(9): 1933-1942.
    [2]Du Yi, Zhang Ting, Lu Detang, Li Daolun. An Interpolation Method Using an Improved Markov Model[J]. Journal of Computer Research and Development, 2012, 49(3): 565-571.
    [3]Dong Yongquan, Li Qingzhong, Ding Yanhui, Peng Zhaohui. Constrained Conditional Random Fields for Semantic Annotation of Web Data[J]. Journal of Computer Research and Development, 2012, 49(2): 361-371.
    [4]Chen Yarui and Liao Shizhong. A Normalized Structure Selection Algorithm Based on Coupling for Gaussian Mean Fields[J]. Journal of Computer Research and Development, 2010, 47(9): 1497-1503.
    [5]Li Guochen, Wang Ruibo, Li Jihong. Automatic Labeling of Chinese Functional Chunks Based on Conditional Random Fields Model[J]. Journal of Computer Research and Development, 2010, 47(2): 336-343.
    [6]Wang Wenhui, Feng Qianjin, Chen Wufan. Segmentation of Brain MR Images Based on the Measurement of Difference of Mutual Information and Gauss-Markov Random Field Model[J]. Journal of Computer Research and Development, 2009, 46(3): 521-527.
    [7]Ge Hongwei and Liang Yanchun. A Multiple Sequence Alignment Algorithm Based on a Hidden Markov Model and Immune Particle Swarm Optimization[J]. Journal of Computer Research and Development, 2006, 43(8): 1330-1336.
    [8]Huang Chenrong, Zhang Zhengjun, Wu Huizhong. A Multi-Scale Images Edge Detection Model Based on Gap Statistic of Order Wilcoxon Rank Sum[J]. Journal of Computer Research and Development, 2005, 42(12): 2111-2117.
    [9]Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
    [10]Tang Min, Wang Yuanquan, Pheng Ann Heng, Xia Deshen. Tracking Cardiac MRI Tag by Markov Random Field Theory[J]. Journal of Computer Research and Development, 2005, 42(10): 1740-1745.

Catalog

    Article views (687) PDF downloads (415) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return