{"title":"分布式微安全系统的树状分层模型","authors":"Qin Zhang, Hai Jin, Chuanjiang Yi, Liping Pang","doi":"10.1109/ISPAN.2004.1300543","DOIUrl":null,"url":null,"abstract":"This paper presents a large-scale dynamic self-immune security architecture. In this architecture, a network is modeled as a hierarchy of administrators and hosts. We use a tree-like hierarchical model to guarantee security, scalability and availability of the system. We adopt a simple SSL-based authentication protocol to avoid unauthorized access to administrators, a group management mechanism for trust model, and two fault-tolerant schemes to address single point of failure of administrators.","PeriodicalId":198404,"journal":{"name":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2004-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Tree-like hierarchical model for distributed micro-security system\",\"authors\":\"Qin Zhang, Hai Jin, Chuanjiang Yi, Liping Pang\",\"doi\":\"10.1109/ISPAN.2004.1300543\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a large-scale dynamic self-immune security architecture. In this architecture, a network is modeled as a hierarchy of administrators and hosts. We use a tree-like hierarchical model to guarantee security, scalability and availability of the system. We adopt a simple SSL-based authentication protocol to avoid unauthorized access to administrators, a group management mechanism for trust model, and two fault-tolerant schemes to address single point of failure of administrators.\",\"PeriodicalId\":198404,\"journal\":{\"name\":\"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-05-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPAN.2004.1300543\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPAN.2004.1300543","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tree-like hierarchical model for distributed micro-security system
This paper presents a large-scale dynamic self-immune security architecture. In this architecture, a network is modeled as a hierarchy of administrators and hosts. We use a tree-like hierarchical model to guarantee security, scalability and availability of the system. We adopt a simple SSL-based authentication protocol to avoid unauthorized access to administrators, a group management mechanism for trust model, and two fault-tolerant schemes to address single point of failure of administrators.