Advertisement

The Invasion-Tolerant System Design for the COTS Products Based on the Median Voting Mechanism

  • Chen Jiandi
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 146)

Abstract

Tolerance invasion as a kind of new technology provides new methods and implications for protecting network system, and what it pays attention to is the ability of the system to survive under the unavoidable attack. Improved on the basis of analysing and researching the invasion-tolerant model of the general service. This paper proposed a reliable median voting algorithm, which can make more right voting responses and which is more reliable and securable according with the demand of the mechanism.

Keywords

Tolerance invasion Reduntancy Median voting 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shamir: How to Share a Secret. Communications of the ACM (1979)Google Scholar
  2. 2.
    Boneh, D., Franklin, M.K.: Efficient Generation of Shared RSA Keys. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 425–439. Springer, Heidelberg (1997)Google Scholar
  3. 3.
    Gennaroy, R., Jarecki, S., Krawczykz, H., et al.: Threshold DSS Signatures. In: Theory and Application of Cryptographic Techniques, Number Theory (1996)Google Scholar
  4. 4.
    Takaragi, K., Miyazaki, K., Takahashi, M.: A Threshold Digital Signature Issuing Scheme without Secret Communication. Systems Development Laboratory, Hitachi, LtdGoogle Scholar
  5. 5.
    Fraga, J., Powell, D.: A Fault and Intrusion-tolerant File System. In: The 3rd International Conference on Computer Security, pp. 203–218 (1985)Google Scholar
  6. 6.
    Sames, D., Matt, B., Niebuhr, B., et al.: Developing a Heterogeneous Intrusion Tolerant COBRA System. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 387–396. IEEE Press (2002)Google Scholar
  7. 7.
    Valdes, A., Almgren, M., Cheung, S., Deswarte, Y., Dutertre, B., Levy, J., Saïdi, H., Stavridou, V., Uribe, T.E.: An Architecture for an Adaptive Intrusion-Tolerant Server. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 158–178. Springer, Heidelberg (2004)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.ChangChun UniversityChangchunChina

Personalised recommendations