Skip to main content
Top

2014 | OriginalPaper | Chapter

5. Trusted Computation Through Biologically Inspired Processes

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In today’s computing environments, one must assume that a subset of the system is currently, or will eventually be compromised. The proposed architecture supports design separation for high reliability and information assurance. By leveraging a hybrid fault model with multiple, parallel execution paths and resultant execution trace comparison, the proposed cognitive trust architecture identifies suspect nodes and assures trusted execution. Furthermore, the modeled architecture may be scaled through proactive thread diversity for additional assurance during threat escalation. The solution provides dynamic protection through distributing critical information across federated cloud resources that adopt a metamorphic topology, redundant execution, and the ability to break command and control of malicious agents.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Lammel, R., “Googles MapReduce programming model Revisited,” Science of Computer Programming 70(1), 1–30 (2008).MathSciNetCrossRef Lammel, R., “Googles MapReduce programming model Revisited,” Science of Computer Programming 70(1), 1–30 (2008).MathSciNetCrossRef
2.
go back to reference Gollman, D., [Computer Security], John Wiley & Sons (2011). Gollman, D., [Computer Security], John Wiley & Sons (2011).
3.
go back to reference Saltzer, J. H. and Schroeder, M. D., “The protection of information in computer systems,” Proceedings of the IEEE 63(9), 1278–1308 (1975).CrossRef Saltzer, J. H. and Schroeder, M. D., “The protection of information in computer systems,” Proceedings of the IEEE 63(9), 1278–1308 (1975).CrossRef
4.
go back to reference Han, S.-J., Oh, H.-S., and Park, J., “The improved data encryption standard (DES) algorithm,” in [Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on], 3, 1310– 1314, IEEE (1996). Han, S.-J., Oh, H.-S., and Park, J., “The improved data encryption standard (DES) algorithm,” in [Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on], 3, 1310– 1314, IEEE (1996).
5.
go back to reference Diffie, W. and Hellman, M., “New directions in cryptography,” Information Theory, IEEE Transactions on 22(6), 644–654 (1976). Diffie, W. and Hellman, M., “New directions in cryptography,” Information Theory, IEEE Transactions on 22(6), 644–654 (1976).
6.
go back to reference Rivest, R. L., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM 21(2), 120–126 (1978).MathSciNetCrossRefMATH Rivest, R. L., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM 21(2), 120–126 (1978).MathSciNetCrossRefMATH
7.
go back to reference Clark, D. D. and Wilson, D. R., “A comparison of commercial and military computer security policies,” NIST SPECIAL PUBLICATION SP (1989). Clark, D. D. and Wilson, D. R., “A comparison of commercial and military computer security policies,” NIST SPECIAL PUBLICATION SP (1989).
8.
go back to reference Brewer, D. F. and Nash, M. J., “The chinese wall security policy,” in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on], 206–214, IEEE (1989). Brewer, D. F. and Nash, M. J., “The chinese wall security policy,” in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on], 206–214, IEEE (1989).
9.
go back to reference One, A., “Smashing the stack for fun and profit,” Phrack magazine 7(49), 14–16 (1996). One, A., “Smashing the stack for fun and profit,” Phrack magazine 7(49), 14–16 (1996).
10.
go back to reference Eaton, J. W. et al., [GNU octave], Free Software Foundation (1997). Eaton, J. W. et al., [GNU octave], Free Software Foundation (1997).
11.
go back to reference Wang, W., Zeng, G., Tang, D., and Yao, J., “Cloud-DLS: Dynamic trusted scheduling for Cloud computing,” Expert Systems with Applications 39(3), 2321–2329 (2012).CrossRef Wang, W., Zeng, G., Tang, D., and Yao, J., “Cloud-DLS: Dynamic trusted scheduling for Cloud computing,” Expert Systems with Applications 39(3), 2321–2329 (2012).CrossRef
12.
go back to reference Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., “Not so different after all: A cross-discipline view of trust.,” Academy of management review 23(3), 393–404 (1998).CrossRef Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., “Not so different after all: A cross-discipline view of trust.,” Academy of management review 23(3), 393–404 (1998).CrossRef
13.
go back to reference Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An integrative model of organizational trust,” Academy of management review, 709–734 (1995). Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An integrative model of organizational trust,” Academy of management review, 709–734 (1995).
Metadata
Title
Trusted Computation Through Biologically Inspired Processes
Author
Gustave W. Anderson
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-10374-7_5

Premium Partner