{"title":"关键信息系统的可生存方案","authors":"Zhu Jianming, Wang Chao","doi":"10.1109/SECTECH.2008.56","DOIUrl":null,"url":null,"abstract":"In survivable information systems, any intrusion or failure into a part of the system will not endanger essential functions of the systems. This paper proposes survivable scheme for critical information systems based on intrusion-tolerant policy and multi-version subsystems. Using the techniques of both redundancy and diversity, the survivability of critical information systems is achieved in the presence of intrusions or failures. Compared with other survivable schemes, our approach has implemented the security and robustness for the key functions of a critical information system by using the integration security strategy and multiple security strategies.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A Survivable Scheme for Critical Information System\",\"authors\":\"Zhu Jianming, Wang Chao\",\"doi\":\"10.1109/SECTECH.2008.56\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In survivable information systems, any intrusion or failure into a part of the system will not endanger essential functions of the systems. This paper proposes survivable scheme for critical information systems based on intrusion-tolerant policy and multi-version subsystems. Using the techniques of both redundancy and diversity, the survivability of critical information systems is achieved in the presence of intrusions or failures. Compared with other survivable schemes, our approach has implemented the security and robustness for the key functions of a critical information system by using the integration security strategy and multiple security strategies.\",\"PeriodicalId\":377461,\"journal\":{\"name\":\"2008 International Conference on Security Technology\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2008.56\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.56","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survivable Scheme for Critical Information System
In survivable information systems, any intrusion or failure into a part of the system will not endanger essential functions of the systems. This paper proposes survivable scheme for critical information systems based on intrusion-tolerant policy and multi-version subsystems. Using the techniques of both redundancy and diversity, the survivability of critical information systems is achieved in the presence of intrusions or failures. Compared with other survivable schemes, our approach has implemented the security and robustness for the key functions of a critical information system by using the integration security strategy and multiple security strategies.