透明计算背后的信息安全:影响、愿景和挑战

Yaoxue Zhang, L. Yang, Yuezhi Zhou, Wenyuan Kuang
{"title":"透明计算背后的信息安全:影响、愿景和挑战","authors":"Yaoxue Zhang, L. Yang, Yuezhi Zhou, Wenyuan Kuang","doi":"10.3233/WIA-2010-0187","DOIUrl":null,"url":null,"abstract":"The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, we propose a new network security mechanism based on a novel computing paradigm, i.e., transparent computing, which is based on the extended von Neumann architecture. This paradigm separates the program storage and execution, which is implemented in the network environment. It is realized by a new generation server and client BIOS, namely EFI BIOS, and coordinated with the MetaOS management platform and related switching and input/ouput devices of transparent computing. Through the interface between hardware and software, it conducts effective control, monitoring and management of data and instructions in a block-streaming way for the operating system and the application programs above it. At the same time, it adopts a security protection mechanism to prevent and remove prevalent malicious software such as worm and Trojan horse. Several demonstrated examples are described in detail to illustrate the attractive and promising security features and advantages.","PeriodicalId":263450,"journal":{"name":"Web Intell. Agent Syst.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"Information security underlying transparent computing: Impacts, visions and challenges\",\"authors\":\"Yaoxue Zhang, L. Yang, Yuezhi Zhou, Wenyuan Kuang\",\"doi\":\"10.3233/WIA-2010-0187\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, we propose a new network security mechanism based on a novel computing paradigm, i.e., transparent computing, which is based on the extended von Neumann architecture. This paradigm separates the program storage and execution, which is implemented in the network environment. It is realized by a new generation server and client BIOS, namely EFI BIOS, and coordinated with the MetaOS management platform and related switching and input/ouput devices of transparent computing. Through the interface between hardware and software, it conducts effective control, monitoring and management of data and instructions in a block-streaming way for the operating system and the application programs above it. At the same time, it adopts a security protection mechanism to prevent and remove prevalent malicious software such as worm and Trojan horse. Several demonstrated examples are described in detail to illustrate the attractive and promising security features and advantages.\",\"PeriodicalId\":263450,\"journal\":{\"name\":\"Web Intell. Agent Syst.\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Web Intell. Agent Syst.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.3233/WIA-2010-0187\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Web Intell. Agent Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/WIA-2010-0187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

摘要

计算机网络技术和社会信息化的飞速发展,给信息安全带来了许多新的机遇和挑战。随着越来越多的人享受到信息和服务的共享,如何加强信息安全已成为一个日益重要的问题。在本文中,我们提出了一种新的网络安全机制,基于一种新的计算范式,即透明计算,它是基于扩展的冯·诺伊曼架构。这种范例将程序的存储和执行分离开来,在网络环境中实现。它由新一代服务器和客户端BIOS即EFI BIOS实现,并与MetaOS管理平台以及相关的透明计算开关和输入/输出设备相协调。它通过硬件和软件之间的接口,以块流的方式对操作系统及其上面的应用程序进行数据和指令的有效控制、监控和管理。同时采用安全防护机制,防止和清除蠕虫、木马等流行的恶意软件。详细描述了几个演示示例,以说明有吸引力和有前途的安全特性和优势。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Information security underlying transparent computing: Impacts, visions and challenges
The rapid development of computer network technologies and social informationalization has brought many new opportunities and challenges in information security. With improved information and service sharing enjoyed by more and more people, how to strengthen the information security has become an increasingly critical issue. In this paper, we propose a new network security mechanism based on a novel computing paradigm, i.e., transparent computing, which is based on the extended von Neumann architecture. This paradigm separates the program storage and execution, which is implemented in the network environment. It is realized by a new generation server and client BIOS, namely EFI BIOS, and coordinated with the MetaOS management platform and related switching and input/ouput devices of transparent computing. Through the interface between hardware and software, it conducts effective control, monitoring and management of data and instructions in a block-streaming way for the operating system and the application programs above it. At the same time, it adopts a security protection mechanism to prevent and remove prevalent malicious software such as worm and Trojan horse. Several demonstrated examples are described in detail to illustrate the attractive and promising security features and advantages.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信