Trusted Network Model and Repair
The credibility of the proposal and development process of the network and how it works, in the traditional network model, based on credible combination of life sciences to the behavioral characteristics of the data contained in the main line, build a credible model of network theory, in this proposed based on a credible fix the overall network design and a detailed discussion of the trusted network repair services technology, given the credibility of the model repair and restoration of network services, work flow, provide a credible rehabilitation program. Resources in ensuring the restoration of the program transmission of fast, reliable based on the performance with a certain extension.
KeywordsTrusted network Trusted remediation Network security
This work is partially supported by Shaanxi Provincial Science and Technology Department: Computer Software and Security Technology (2009JM8003).
- 1.Meifeng S, Jian G (2004) The research of formal specification of intrusion detection rules. In: Proceedings-conference on local computer networks, vol 25(15). LCN, Tampa, pp 429–430Google Scholar
- 2.Harn L, Hsin WJ, Mehta M (2005) Authenticated Diffic-Hellman key agreement protocol using a single cryptographic assumption. IEEE Proc Commu 12(10):404–410Google Scholar
- 3.Beth T, Borcherding M, Klein B (1994) Valuation of trust in open network. In: Gollmann D (ed) Proceedings of the European Symposium on research in security, vol 7(2). Springer, Brighton, pp 3–18Google Scholar